General

  • Target

    b2bb3c540cdb1a22fcfbdba53e1137ed4809227bde09cdd5ac3fd4a985dcbacb

  • Size

    670KB

  • Sample

    241106-k5bfyaxhql

  • MD5

    3fff431cd0549149e7031170edace814

  • SHA1

    5110f9acaacec3c13cdbb7ece6ea2d0e11e8a548

  • SHA256

    b2bb3c540cdb1a22fcfbdba53e1137ed4809227bde09cdd5ac3fd4a985dcbacb

  • SHA512

    cc0a42a293c757456d3f4178cdc71d8f3af6086d2e635c9775c9379bdd52e8fadd9ab657e480e180e9bd753894954b7a2478b5102e3f5cd8c5a9fcb6911b44e0

  • SSDEEP

    12288:8MrEy90UK4gDY7mbBiMZE1KvBV39TK7jzleUcJJyCWqgxMp/zj2nChFeoZPX:4y4Y7mwKBngg3uCWqbp/f2Chf

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      b2bb3c540cdb1a22fcfbdba53e1137ed4809227bde09cdd5ac3fd4a985dcbacb

    • Size

      670KB

    • MD5

      3fff431cd0549149e7031170edace814

    • SHA1

      5110f9acaacec3c13cdbb7ece6ea2d0e11e8a548

    • SHA256

      b2bb3c540cdb1a22fcfbdba53e1137ed4809227bde09cdd5ac3fd4a985dcbacb

    • SHA512

      cc0a42a293c757456d3f4178cdc71d8f3af6086d2e635c9775c9379bdd52e8fadd9ab657e480e180e9bd753894954b7a2478b5102e3f5cd8c5a9fcb6911b44e0

    • SSDEEP

      12288:8MrEy90UK4gDY7mbBiMZE1KvBV39TK7jzleUcJJyCWqgxMp/zj2nChFeoZPX:4y4Y7mwKBngg3uCWqbp/f2Chf

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks