General

  • Target

    72bdc85789687af4447796b39bb0ebd770e2546b80487020dc38b5681d02f2ed

  • Size

    534KB

  • Sample

    241106-abddbs1fmh

  • MD5

    7fadef0b3f7b859937bbd5679ccebfd9

  • SHA1

    ff4c6d59977118bfc69593965e5f50dee7e5d10d

  • SHA256

    72bdc85789687af4447796b39bb0ebd770e2546b80487020dc38b5681d02f2ed

  • SHA512

    22ddd8132d48af171fbaaa5f0c3ac71f083e85c0e194fb835f24d442136778ab405da6dda4dac3377391577e46c9a27f49f5d3f471392d1ab812448bdaa54b01

  • SSDEEP

    12288:OMrdy90CgAaJXfhge1kEXreKzFbDWwYBwTtfZJkrX9:3yGA4SKzpDlywDW9

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      72bdc85789687af4447796b39bb0ebd770e2546b80487020dc38b5681d02f2ed

    • Size

      534KB

    • MD5

      7fadef0b3f7b859937bbd5679ccebfd9

    • SHA1

      ff4c6d59977118bfc69593965e5f50dee7e5d10d

    • SHA256

      72bdc85789687af4447796b39bb0ebd770e2546b80487020dc38b5681d02f2ed

    • SHA512

      22ddd8132d48af171fbaaa5f0c3ac71f083e85c0e194fb835f24d442136778ab405da6dda4dac3377391577e46c9a27f49f5d3f471392d1ab812448bdaa54b01

    • SSDEEP

      12288:OMrdy90CgAaJXfhge1kEXreKzFbDWwYBwTtfZJkrX9:3yGA4SKzpDlywDW9

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks