General

  • Target

    ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52

  • Size

    667KB

  • Sample

    241105-yrpcjazpbj

  • MD5

    3a1a9e39424b756ef3277dacfcea1edb

  • SHA1

    67bedbb597039553c8cfb670300acf62351f5736

  • SHA256

    ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52

  • SHA512

    367372c3d55bfc85e7c4227f0460dc32e4eab4c8b752bbe8f83ae4446b0f8450454a0b9384a4dbd71c9c3b3c6672f00cf47a38549413a1b65c2749b43778655f

  • SSDEEP

    12288:WMrJy90Vlvnj176RD10PkOmCNJXr0FLxmIYZ22ZmzrUjMH/w6sZYouGMDj:Lym5GZsmgoFoIYI20r5fw6sZYolo

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52

    • Size

      667KB

    • MD5

      3a1a9e39424b756ef3277dacfcea1edb

    • SHA1

      67bedbb597039553c8cfb670300acf62351f5736

    • SHA256

      ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52

    • SHA512

      367372c3d55bfc85e7c4227f0460dc32e4eab4c8b752bbe8f83ae4446b0f8450454a0b9384a4dbd71c9c3b3c6672f00cf47a38549413a1b65c2749b43778655f

    • SSDEEP

      12288:WMrJy90Vlvnj176RD10PkOmCNJXr0FLxmIYZ22ZmzrUjMH/w6sZYouGMDj:Lym5GZsmgoFoIYI20r5fw6sZYolo

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks