General

  • Target

    04195b785c0426488d57d1e850913b54e35c9bb408a6aa13e1bf0e843a3f22f2

  • Size

    531KB

  • Sample

    241105-wg2h1awfpr

  • MD5

    fd0ac29ff03b2e4f5c32b403d8b08460

  • SHA1

    08f64639be6acbedac559b37192252a6c3ca0ab6

  • SHA256

    04195b785c0426488d57d1e850913b54e35c9bb408a6aa13e1bf0e843a3f22f2

  • SHA512

    4e622c622ec28751f10761fbe8864f3462f2e0c60ea13de4ebf19b488d2fae5dea946670edee34209a59cbab01942ba686274a9cfdcb685dac4b1982685066de

  • SSDEEP

    6144:Kly+bnr+Cp0yN90QEKDvaWzmdA4Zh07ieVwo9iotBeYuXQerug2DfdPgggY0tMTg:PMryy90GKVPUeYuXQO2OYub1m+

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      04195b785c0426488d57d1e850913b54e35c9bb408a6aa13e1bf0e843a3f22f2

    • Size

      531KB

    • MD5

      fd0ac29ff03b2e4f5c32b403d8b08460

    • SHA1

      08f64639be6acbedac559b37192252a6c3ca0ab6

    • SHA256

      04195b785c0426488d57d1e850913b54e35c9bb408a6aa13e1bf0e843a3f22f2

    • SHA512

      4e622c622ec28751f10761fbe8864f3462f2e0c60ea13de4ebf19b488d2fae5dea946670edee34209a59cbab01942ba686274a9cfdcb685dac4b1982685066de

    • SSDEEP

      6144:Kly+bnr+Cp0yN90QEKDvaWzmdA4Zh07ieVwo9iotBeYuXQerug2DfdPgggY0tMTg:PMryy90GKVPUeYuXQO2OYub1m+

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks