General

  • Target

    19285c62c57df251ab707918a1cd48c07506bca24c013c7f32e7f333e96c1c0c

  • Size

    531KB

  • Sample

    241105-wamq9svgqb

  • MD5

    5c75341ae77752c3ae97eb570d4f5444

  • SHA1

    77c4206275a3d5d2b0d20cd7d2272eae82e21dfb

  • SHA256

    19285c62c57df251ab707918a1cd48c07506bca24c013c7f32e7f333e96c1c0c

  • SHA512

    a2c48e2fa253874e2d726049bccd34477796d77d03622260a939d11f8ea2c5e9a512e11a7389546f6d75651e0d54f1fcda1f6dd7a1a04d0657da02ef0801aafe

  • SSDEEP

    12288:VMryy90ZSWoNUuOX74S1f5KXa/AplgKvqJ44orEW:ryB/U+SA/XgGX4ooW

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      19285c62c57df251ab707918a1cd48c07506bca24c013c7f32e7f333e96c1c0c

    • Size

      531KB

    • MD5

      5c75341ae77752c3ae97eb570d4f5444

    • SHA1

      77c4206275a3d5d2b0d20cd7d2272eae82e21dfb

    • SHA256

      19285c62c57df251ab707918a1cd48c07506bca24c013c7f32e7f333e96c1c0c

    • SHA512

      a2c48e2fa253874e2d726049bccd34477796d77d03622260a939d11f8ea2c5e9a512e11a7389546f6d75651e0d54f1fcda1f6dd7a1a04d0657da02ef0801aafe

    • SSDEEP

      12288:VMryy90ZSWoNUuOX74S1f5KXa/AplgKvqJ44orEW:ryB/U+SA/XgGX4ooW

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks