General

  • Target

    a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826

  • Size

    531KB

  • Sample

    241105-zmzhda1lak

  • MD5

    e9fd00e2e059898180f2b8b8d8817928

  • SHA1

    a65e93655da32f704d0cdb2b1a4ead13d75fa45c

  • SHA256

    a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826

  • SHA512

    2d2e2174a2f4492403eaa1e5448c0d7e05988ccebdcf17d8bf779a2a3917bfb3d11aae092a2a169dbb64d891385f67aad7013d9b374a6058969d8b947e2d74ab

  • SSDEEP

    12288:OMrfy90zmDZorXZ88WqI3szU+f5KXa/PeiR3WwgDQx3:dyDqXZ88W73szLAEeioq3

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826

    • Size

      531KB

    • MD5

      e9fd00e2e059898180f2b8b8d8817928

    • SHA1

      a65e93655da32f704d0cdb2b1a4ead13d75fa45c

    • SHA256

      a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826

    • SHA512

      2d2e2174a2f4492403eaa1e5448c0d7e05988ccebdcf17d8bf779a2a3917bfb3d11aae092a2a169dbb64d891385f67aad7013d9b374a6058969d8b947e2d74ab

    • SSDEEP

      12288:OMrfy90zmDZorXZ88WqI3szU+f5KXa/PeiR3WwgDQx3:dyDqXZ88W73szLAEeioq3

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks