General

  • Target

    de3c8d07361d0428bb80b43d75e114a1306715a4f95742de0437372b08bb4177

  • Size

    689KB

  • Sample

    241106-kf2xlawlds

  • MD5

    e1a3cb2ebdd8d986e1270f0f9cba39fa

  • SHA1

    7ea5c88504c2038627224a4319bbeb8e93b8f612

  • SHA256

    de3c8d07361d0428bb80b43d75e114a1306715a4f95742de0437372b08bb4177

  • SHA512

    0fa626bc7e9d04127d39c52411c3c284b73eb55d1367f9e6f6fd99b4c45ee8080ff19d260cfcc275c8740bd5fe29af6653c267aa66afbd8ff2ad1312f3a84ed1

  • SSDEEP

    12288:nMrWy90viSEi7MdrsCggfcyEQNz2KcweNuZGsIXRMCFNH/aC:VyBi7A1fnZfepSwNH/aC

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      de3c8d07361d0428bb80b43d75e114a1306715a4f95742de0437372b08bb4177

    • Size

      689KB

    • MD5

      e1a3cb2ebdd8d986e1270f0f9cba39fa

    • SHA1

      7ea5c88504c2038627224a4319bbeb8e93b8f612

    • SHA256

      de3c8d07361d0428bb80b43d75e114a1306715a4f95742de0437372b08bb4177

    • SHA512

      0fa626bc7e9d04127d39c52411c3c284b73eb55d1367f9e6f6fd99b4c45ee8080ff19d260cfcc275c8740bd5fe29af6653c267aa66afbd8ff2ad1312f3a84ed1

    • SSDEEP

      12288:nMrWy90viSEi7MdrsCggfcyEQNz2KcweNuZGsIXRMCFNH/aC:VyBi7A1fnZfepSwNH/aC

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks