General

  • Target

    fe605ef7abc8196a35aa3a648d0d06ed89e8fbdb344ed1c5095b2b87b292ed8b

  • Size

    695KB

  • Sample

    241105-z3m5aazapj

  • MD5

    e63d1f32f877d60f730d4f1f3a6666bf

  • SHA1

    5cff9984ee9ab3fd64fe89cb9b59168497b8edff

  • SHA256

    fe605ef7abc8196a35aa3a648d0d06ed89e8fbdb344ed1c5095b2b87b292ed8b

  • SHA512

    436e32b282dd4f0471ea3f56c60f4df5173a05897358ff9b071aff03c61a613366659ea507b31479a22fdcfad80a59940e665a530c8a06437e0eb8b37bb23d44

  • SSDEEP

    12288:IMrty90bvb7dE7Q0kXoi/M8XLM5AQgq7YaDz/I85nQoVu0iZSiCszG:lyg7yIXv/FM5/gq7YOj35nQo1iJzG

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      fe605ef7abc8196a35aa3a648d0d06ed89e8fbdb344ed1c5095b2b87b292ed8b

    • Size

      695KB

    • MD5

      e63d1f32f877d60f730d4f1f3a6666bf

    • SHA1

      5cff9984ee9ab3fd64fe89cb9b59168497b8edff

    • SHA256

      fe605ef7abc8196a35aa3a648d0d06ed89e8fbdb344ed1c5095b2b87b292ed8b

    • SHA512

      436e32b282dd4f0471ea3f56c60f4df5173a05897358ff9b071aff03c61a613366659ea507b31479a22fdcfad80a59940e665a530c8a06437e0eb8b37bb23d44

    • SSDEEP

      12288:IMrty90bvb7dE7Q0kXoi/M8XLM5AQgq7YaDz/I85nQoVu0iZSiCszG:lyg7yIXv/FM5/gq7YOj35nQo1iJzG

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks