General

  • Target

    a4ece5c266145c5a4df7ddcdccbbd0190d142795d5a92020b696481c065e4562

  • Size

    560KB

  • Sample

    241105-wq5l1swgqq

  • MD5

    9562d237c41e8b54273dd3b6b6251bb4

  • SHA1

    915fdaa7d41ceac4a993813bfc0252d3817241df

  • SHA256

    a4ece5c266145c5a4df7ddcdccbbd0190d142795d5a92020b696481c065e4562

  • SHA512

    a3ef5d0eefc8cfc0ea273e0bb5b1befb085009a3ccbab2ed56b867cb69fc410e413b4580a1527119c442c9918a9a1850e34a4628a21601b1d8c2c72877193c33

  • SSDEEP

    12288:3Mrey90TxK31zNr4qI3QVnHeayZ04hZhelgDjG3:tyEUlzNMqIgVgDhelgY

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      a4ece5c266145c5a4df7ddcdccbbd0190d142795d5a92020b696481c065e4562

    • Size

      560KB

    • MD5

      9562d237c41e8b54273dd3b6b6251bb4

    • SHA1

      915fdaa7d41ceac4a993813bfc0252d3817241df

    • SHA256

      a4ece5c266145c5a4df7ddcdccbbd0190d142795d5a92020b696481c065e4562

    • SHA512

      a3ef5d0eefc8cfc0ea273e0bb5b1befb085009a3ccbab2ed56b867cb69fc410e413b4580a1527119c442c9918a9a1850e34a4628a21601b1d8c2c72877193c33

    • SSDEEP

      12288:3Mrey90TxK31zNr4qI3QVnHeayZ04hZhelgDjG3:tyEUlzNMqIgVgDhelgY

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks