General

  • Target

    94934ee5c1fcc9a966594efd499e2252cfe8e5a85cc7e1d2cfd7a44ac27a62a6

  • Size

    990KB

  • Sample

    241106-l55v8azrfr

  • MD5

    5f46e5d911c94521ce7430706cfef078

  • SHA1

    f6d558c506b8d16bd75795f98893dcb60003f2a3

  • SHA256

    94934ee5c1fcc9a966594efd499e2252cfe8e5a85cc7e1d2cfd7a44ac27a62a6

  • SHA512

    e52e94cd862548b018e4fa95ed05c29c0e86c0a4ffa56cd8a33272b1d2738529ece90a397834d5189053864cd9d403a4f1d412a54aacb998158edc61e2aec7fc

  • SSDEEP

    12288:kMr5y90G0v9JiTZk/iekUteuhA5F8BvwAbLMAN/UnNkfK1aeirWR0OW+X8p1mXGK:9y6v8eveuhA5GjP6WfeRu+XE4XGi8c

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      94934ee5c1fcc9a966594efd499e2252cfe8e5a85cc7e1d2cfd7a44ac27a62a6

    • Size

      990KB

    • MD5

      5f46e5d911c94521ce7430706cfef078

    • SHA1

      f6d558c506b8d16bd75795f98893dcb60003f2a3

    • SHA256

      94934ee5c1fcc9a966594efd499e2252cfe8e5a85cc7e1d2cfd7a44ac27a62a6

    • SHA512

      e52e94cd862548b018e4fa95ed05c29c0e86c0a4ffa56cd8a33272b1d2738529ece90a397834d5189053864cd9d403a4f1d412a54aacb998158edc61e2aec7fc

    • SSDEEP

      12288:kMr5y90G0v9JiTZk/iekUteuhA5F8BvwAbLMAN/UnNkfK1aeirWR0OW+X8p1mXGK:9y6v8eveuhA5GjP6WfeRu+XE4XGi8c

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks