General

  • Target

    d57095c02158c2e8a2b14bceaa482a68df09144a90081db069cc4017aedacb50

  • Size

    530KB

  • Sample

    241106-k1deqsxdme

  • MD5

    f1cdaa6cf4d70c383b9e5fa6b7b7819b

  • SHA1

    db6b93650852d02329913df6108aae01ec683c78

  • SHA256

    d57095c02158c2e8a2b14bceaa482a68df09144a90081db069cc4017aedacb50

  • SHA512

    12d15330e430f1f3852539b8f8222a4bc2db85acc58260f9fda5986754eea5fbb162a8027d7aba4d1ecf6e0c3e0ed5b2a18869ec1d5ed593fc7a9e3760831b55

  • SSDEEP

    12288:UMrOy90NfuxFYuaugOHBxGE8pxNtkDdCtxM4:Ky1WugAGE8DNSdCtxM4

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      d57095c02158c2e8a2b14bceaa482a68df09144a90081db069cc4017aedacb50

    • Size

      530KB

    • MD5

      f1cdaa6cf4d70c383b9e5fa6b7b7819b

    • SHA1

      db6b93650852d02329913df6108aae01ec683c78

    • SHA256

      d57095c02158c2e8a2b14bceaa482a68df09144a90081db069cc4017aedacb50

    • SHA512

      12d15330e430f1f3852539b8f8222a4bc2db85acc58260f9fda5986754eea5fbb162a8027d7aba4d1ecf6e0c3e0ed5b2a18869ec1d5ed593fc7a9e3760831b55

    • SSDEEP

      12288:UMrOy90NfuxFYuaugOHBxGE8pxNtkDdCtxM4:Ky1WugAGE8DNSdCtxM4

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks