General

  • Target

    92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491

  • Size

    530KB

  • Sample

    241105-wc29qsvhkf

  • MD5

    3fd6d5f18bf08b4b813b6cc8c533ba26

  • SHA1

    219181babf1539a1700aefaab3d76dec6e8800a0

  • SHA256

    92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491

  • SHA512

    8a3e517cf5301339651baa9698d6c2c2debeb0347a5ca5f948308b474e3201944e730de6b16fe1b10dfa828bcaf737842f32ef526cf76a23e509f3a378cfdb59

  • SSDEEP

    12288:SMrYy90oG/dW02HD+BRTIO245aU+hwk5o0/vCV1E:eyQX2j+BVwhwAAV1E

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491

    • Size

      530KB

    • MD5

      3fd6d5f18bf08b4b813b6cc8c533ba26

    • SHA1

      219181babf1539a1700aefaab3d76dec6e8800a0

    • SHA256

      92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491

    • SHA512

      8a3e517cf5301339651baa9698d6c2c2debeb0347a5ca5f948308b474e3201944e730de6b16fe1b10dfa828bcaf737842f32ef526cf76a23e509f3a378cfdb59

    • SSDEEP

      12288:SMrYy90oG/dW02HD+BRTIO245aU+hwk5o0/vCV1E:eyQX2j+BVwhwAAV1E

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks