General

  • Target

    ffae832c6cff454aba4696af74df07fde63ba2099452e79c3702ce88f94f5fa6

  • Size

    530KB

  • Sample

    241105-w11qtaxakk

  • MD5

    6b9c2b8f8007e74e2e8497e7b8e42438

  • SHA1

    229081aec6b6a6d8f590bf34ad10c9f2cce9a87f

  • SHA256

    ffae832c6cff454aba4696af74df07fde63ba2099452e79c3702ce88f94f5fa6

  • SHA512

    0e27f0544028e78216c89801634d2114016969463634a442fbc6ec881ecf3680082cc6c6af5a7e300362cfbf1b66a482c69f45c9bc9d6d90b0c187bd9bccc3ab

  • SSDEEP

    12288:/Mrcy90uY4L3SOny0LCPtfYyklPE8+x0tjsaESIDaG6:/y9/iOnLCPtwySPE8U0tjOSI+G6

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      ffae832c6cff454aba4696af74df07fde63ba2099452e79c3702ce88f94f5fa6

    • Size

      530KB

    • MD5

      6b9c2b8f8007e74e2e8497e7b8e42438

    • SHA1

      229081aec6b6a6d8f590bf34ad10c9f2cce9a87f

    • SHA256

      ffae832c6cff454aba4696af74df07fde63ba2099452e79c3702ce88f94f5fa6

    • SHA512

      0e27f0544028e78216c89801634d2114016969463634a442fbc6ec881ecf3680082cc6c6af5a7e300362cfbf1b66a482c69f45c9bc9d6d90b0c187bd9bccc3ab

    • SSDEEP

      12288:/Mrcy90uY4L3SOny0LCPtfYyklPE8+x0tjsaESIDaG6:/y9/iOnLCPtwySPE8U0tjOSI+G6

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks