General

  • Target

    ef66f6afd83cebc3492b8d90f963cfbb4f6827ec3418c4f8156d3ff779f03f91

  • Size

    530KB

  • Sample

    241106-l1dk6syalb

  • MD5

    476366b07b2c7d3c8c0e0490198c770b

  • SHA1

    d1d8466651ce0718dcdaa1b8b81a0968a12c5240

  • SHA256

    ef66f6afd83cebc3492b8d90f963cfbb4f6827ec3418c4f8156d3ff779f03f91

  • SHA512

    3941bcd12f244a95bb3a45b425dda682632b55dca123cf534e010150506e33c516f2cf117d6efa72cdcdade474740c049531e9429473ae72ee62a090abf2c5f0

  • SSDEEP

    12288:6Mrky90Ocv8lo1q5oAUXEwSO8qR4IylBYi+jGTtcp:CylflBoAWES8qyHlBY2tQ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      ef66f6afd83cebc3492b8d90f963cfbb4f6827ec3418c4f8156d3ff779f03f91

    • Size

      530KB

    • MD5

      476366b07b2c7d3c8c0e0490198c770b

    • SHA1

      d1d8466651ce0718dcdaa1b8b81a0968a12c5240

    • SHA256

      ef66f6afd83cebc3492b8d90f963cfbb4f6827ec3418c4f8156d3ff779f03f91

    • SHA512

      3941bcd12f244a95bb3a45b425dda682632b55dca123cf534e010150506e33c516f2cf117d6efa72cdcdade474740c049531e9429473ae72ee62a090abf2c5f0

    • SSDEEP

      12288:6Mrky90Ocv8lo1q5oAUXEwSO8qR4IylBYi+jGTtcp:CylflBoAWES8qyHlBY2tQ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks