General

  • Target

    dac0700e6d672a77a8377cd6adbebc79045f4b9e108a6c27ab07bab7df1e3858

  • Size

    689KB

  • Sample

    241106-jz1yzawgja

  • MD5

    f831dac2152cc6efcee0de3df17136f7

  • SHA1

    d5974a89207a13579d6c3d9ed96c9247a3645e1a

  • SHA256

    dac0700e6d672a77a8377cd6adbebc79045f4b9e108a6c27ab07bab7df1e3858

  • SHA512

    6c336a887147624522eac7b7bcddc27188cc4930f8231a72e0a78f4120bb3c2a5c21168be9fff5f045e53a9e4297c5caed331b36747c45135752f0a570bba9eb

  • SSDEEP

    12288:1Mrcy9075WkMnFc0OBUI1e14H2KcOpfWoxtWJhXRMk5m742:Vy4ZAcxNA1sfhIS8JxSEY

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      dac0700e6d672a77a8377cd6adbebc79045f4b9e108a6c27ab07bab7df1e3858

    • Size

      689KB

    • MD5

      f831dac2152cc6efcee0de3df17136f7

    • SHA1

      d5974a89207a13579d6c3d9ed96c9247a3645e1a

    • SHA256

      dac0700e6d672a77a8377cd6adbebc79045f4b9e108a6c27ab07bab7df1e3858

    • SHA512

      6c336a887147624522eac7b7bcddc27188cc4930f8231a72e0a78f4120bb3c2a5c21168be9fff5f045e53a9e4297c5caed331b36747c45135752f0a570bba9eb

    • SSDEEP

      12288:1Mrcy9075WkMnFc0OBUI1e14H2KcOpfWoxtWJhXRMk5m742:Vy4ZAcxNA1sfhIS8JxSEY

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks