General

  • Target

    2076a13a6c5ce418e468e7b9e913a45a591649515365ff4d4a47cb87ab126c1d

  • Size

    689KB

  • Sample

    241105-ynad7syaqq

  • MD5

    c8fc016ed51324476332b8b5982b0dcb

  • SHA1

    c023752cdde847023eaa39e113b5a9379415b844

  • SHA256

    2076a13a6c5ce418e468e7b9e913a45a591649515365ff4d4a47cb87ab126c1d

  • SHA512

    0f927d2bc06c3e213dcd3f9a61ad449e2ebc4d053506feea698b59400f7d6796d3113542641d402a616aaa8c737c7a367dd367abae5809c21272f059c819fea9

  • SSDEEP

    12288:cMrEy903DoyDyJ5izMM6odX3N1jJMG+D224e/a4VhzfkvSFtmfighfDBUCJ:oyuDA92F3vR+D2Z4PfkutmagN7

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      2076a13a6c5ce418e468e7b9e913a45a591649515365ff4d4a47cb87ab126c1d

    • Size

      689KB

    • MD5

      c8fc016ed51324476332b8b5982b0dcb

    • SHA1

      c023752cdde847023eaa39e113b5a9379415b844

    • SHA256

      2076a13a6c5ce418e468e7b9e913a45a591649515365ff4d4a47cb87ab126c1d

    • SHA512

      0f927d2bc06c3e213dcd3f9a61ad449e2ebc4d053506feea698b59400f7d6796d3113542641d402a616aaa8c737c7a367dd367abae5809c21272f059c819fea9

    • SSDEEP

      12288:cMrEy903DoyDyJ5izMM6odX3N1jJMG+D224e/a4VhzfkvSFtmfighfDBUCJ:oyuDA92F3vR+D2Z4PfkutmagN7

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks