General

  • Target

    236cc6c3c39a67b0a34bf8ac840298a65617979683c5c1befd48abb40a2ac70d

  • Size

    531KB

  • Sample

    241106-kqak4axbqe

  • MD5

    10c3df77197adb80fd6fd531b84dfe1e

  • SHA1

    f889e8db09dfcd95e1e7575964b53d79041c7c2a

  • SHA256

    236cc6c3c39a67b0a34bf8ac840298a65617979683c5c1befd48abb40a2ac70d

  • SHA512

    9900dde07e73155ac39c87cccad6422a784418ed1a2555f09efdfe7ca1ca3063a05a500662f78d864c6d908fa60c200e492639090f99487f9e99703f879d3745

  • SSDEEP

    12288:dMrIy9019zqwkHc+Zay0wyI/eemf5KXa/wmCDRNAtt:ly+3Ip0wmnAvmCDROb

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      236cc6c3c39a67b0a34bf8ac840298a65617979683c5c1befd48abb40a2ac70d

    • Size

      531KB

    • MD5

      10c3df77197adb80fd6fd531b84dfe1e

    • SHA1

      f889e8db09dfcd95e1e7575964b53d79041c7c2a

    • SHA256

      236cc6c3c39a67b0a34bf8ac840298a65617979683c5c1befd48abb40a2ac70d

    • SHA512

      9900dde07e73155ac39c87cccad6422a784418ed1a2555f09efdfe7ca1ca3063a05a500662f78d864c6d908fa60c200e492639090f99487f9e99703f879d3745

    • SSDEEP

      12288:dMrIy9019zqwkHc+Zay0wyI/eemf5KXa/wmCDRNAtt:ly+3Ip0wmnAvmCDROb

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks