General

  • Target

    021fa93813550a036feb4245007523f49acad785704a7ab6afd91d0e240e38a9

  • Size

    700KB

  • Sample

    241105-xaa8xaxbmn

  • MD5

    4c10bd8b9bac78ab0ef862daa36033dd

  • SHA1

    e20aaceaa162cc03950160c681ab3b8edf9f0001

  • SHA256

    021fa93813550a036feb4245007523f49acad785704a7ab6afd91d0e240e38a9

  • SHA512

    a00ecaa4df40cf1441a1c1e8fcd8637f416383e3d415d911e7ceb1b642fe83e6207033c11d53adc34397d8ca714c58e5f03229d5784f75184c68a2043ad9d6d9

  • SSDEEP

    12288:kMrzy903V+1S7hywv8a790uvQtPbgj5pG4ERaBzHK6MCYzzZorgxKIr5mMw:fyMY1Eh8c90uvQdc5pCaqxrBp5Jw

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      021fa93813550a036feb4245007523f49acad785704a7ab6afd91d0e240e38a9

    • Size

      700KB

    • MD5

      4c10bd8b9bac78ab0ef862daa36033dd

    • SHA1

      e20aaceaa162cc03950160c681ab3b8edf9f0001

    • SHA256

      021fa93813550a036feb4245007523f49acad785704a7ab6afd91d0e240e38a9

    • SHA512

      a00ecaa4df40cf1441a1c1e8fcd8637f416383e3d415d911e7ceb1b642fe83e6207033c11d53adc34397d8ca714c58e5f03229d5784f75184c68a2043ad9d6d9

    • SSDEEP

      12288:kMrzy903V+1S7hywv8a790uvQtPbgj5pG4ERaBzHK6MCYzzZorgxKIr5mMw:fyMY1Eh8c90uvQdc5pCaqxrBp5Jw

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks