General

  • Target

    96e5071fd19484fd7203255d745d579a95c0fa805d60381b7fb1d80c3d8bbef3

  • Size

    673KB

  • Sample

    241105-w2sftsvqcz

  • MD5

    f807e632b10657489eecddc13c194ec6

  • SHA1

    a5accab7f890afe2320992aa830dd9139fdfd129

  • SHA256

    96e5071fd19484fd7203255d745d579a95c0fa805d60381b7fb1d80c3d8bbef3

  • SHA512

    505e9ce83f9bfcd2757a6cb5692137336231354e7c5dad24ace2478cc1bac1b2164934b9b64e594b657e04ee60c4b1c68b2dbc27daeb85be0655742e7bfaa4a1

  • SSDEEP

    12288:uMruy90X3QSVhwFjcDDb4uI3X8c94H8HOfT1MC7x3cXWIhka0GW/hlMK:EyAsRs4uI3X8cnH6TFcfkLp/kK

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      96e5071fd19484fd7203255d745d579a95c0fa805d60381b7fb1d80c3d8bbef3

    • Size

      673KB

    • MD5

      f807e632b10657489eecddc13c194ec6

    • SHA1

      a5accab7f890afe2320992aa830dd9139fdfd129

    • SHA256

      96e5071fd19484fd7203255d745d579a95c0fa805d60381b7fb1d80c3d8bbef3

    • SHA512

      505e9ce83f9bfcd2757a6cb5692137336231354e7c5dad24ace2478cc1bac1b2164934b9b64e594b657e04ee60c4b1c68b2dbc27daeb85be0655742e7bfaa4a1

    • SSDEEP

      12288:uMruy90X3QSVhwFjcDDb4uI3X8c94H8HOfT1MC7x3cXWIhka0GW/hlMK:EyAsRs4uI3X8cnH6TFcfkLp/kK

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks