General

  • Target

    891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb

  • Size

    537KB

  • Sample

    241106-k19g6szlap

  • MD5

    5c82ed88a36b4d1de4be733338b3240c

  • SHA1

    c6f64f7775a25beec8ac9f3939a000f5c309022d

  • SHA256

    891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb

  • SHA512

    b0c482f3ae285fb9243a3638ca8ce088138f88fb794b936cc53021dbe96034481a41b189a7206cea77135f1b52ff1192926a583f0f3cb3b598ef60efd18612ac

  • SSDEEP

    12288:KMrTy90f3nVUwKJrP3TF1YMn/HP/0cpYo:Vym3VURrkMvtYo

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb

    • Size

      537KB

    • MD5

      5c82ed88a36b4d1de4be733338b3240c

    • SHA1

      c6f64f7775a25beec8ac9f3939a000f5c309022d

    • SHA256

      891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb

    • SHA512

      b0c482f3ae285fb9243a3638ca8ce088138f88fb794b936cc53021dbe96034481a41b189a7206cea77135f1b52ff1192926a583f0f3cb3b598ef60efd18612ac

    • SSDEEP

      12288:KMrTy90f3nVUwKJrP3TF1YMn/HP/0cpYo:Vym3VURrkMvtYo

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks