General

  • Target

    ba6cbb30bd40a52e78626ae42f9939c520258479ecfcad5fad95c9a9e41a58b8

  • Size

    530KB

  • Sample

    241105-z1nm2a1nbp

  • MD5

    9f6bd5d10588e682b323660ecda48d33

  • SHA1

    391bd20e76781d6e5b93d861d89abfdb60798e8f

  • SHA256

    ba6cbb30bd40a52e78626ae42f9939c520258479ecfcad5fad95c9a9e41a58b8

  • SHA512

    335b266b6e75006d4923517cb7889e28c067375335aa7fcdac4dfde692abe7796842ad275fa647c4cce89b2e6c71d77edae4e31c8c89c5d0a86f2d7643b399eb

  • SSDEEP

    12288:KMrvy902Jdu7E/5UxxYrF61o7de3OS1ywDL3Xl1Gt1:Jy5JYwhIarF6uZeOS1XDzV1U

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      ba6cbb30bd40a52e78626ae42f9939c520258479ecfcad5fad95c9a9e41a58b8

    • Size

      530KB

    • MD5

      9f6bd5d10588e682b323660ecda48d33

    • SHA1

      391bd20e76781d6e5b93d861d89abfdb60798e8f

    • SHA256

      ba6cbb30bd40a52e78626ae42f9939c520258479ecfcad5fad95c9a9e41a58b8

    • SHA512

      335b266b6e75006d4923517cb7889e28c067375335aa7fcdac4dfde692abe7796842ad275fa647c4cce89b2e6c71d77edae4e31c8c89c5d0a86f2d7643b399eb

    • SSDEEP

      12288:KMrvy902Jdu7E/5UxxYrF61o7de3OS1ywDL3Xl1Gt1:Jy5JYwhIarF6uZeOS1XDzV1U

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks