General

  • Target

    788f286a0c8686a02cd65c2a97631e0ea3e37023029666cf6e97f3882cc9959c

  • Size

    659KB

  • Sample

    241106-lb74gsyaql

  • MD5

    743ccf9bf95989514cef22c8c7df5be7

  • SHA1

    78e2af932792781937b22822e8d8ce0aa981ca92

  • SHA256

    788f286a0c8686a02cd65c2a97631e0ea3e37023029666cf6e97f3882cc9959c

  • SHA512

    7bfd9caceb374110ebb35aa940ae464276de83547029adcf825f85b0886329fa1bf202dfb70389642e3620c36de6b5b2b5a937f8459dd425de68dce762bd37d2

  • SSDEEP

    12288:lMrRy90GyD7KI4H7tb2IIWOLSVMCt592rwB6eCZanft/juHTFl:UyMGI45Dp4kt5YW6vZyB+H

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      788f286a0c8686a02cd65c2a97631e0ea3e37023029666cf6e97f3882cc9959c

    • Size

      659KB

    • MD5

      743ccf9bf95989514cef22c8c7df5be7

    • SHA1

      78e2af932792781937b22822e8d8ce0aa981ca92

    • SHA256

      788f286a0c8686a02cd65c2a97631e0ea3e37023029666cf6e97f3882cc9959c

    • SHA512

      7bfd9caceb374110ebb35aa940ae464276de83547029adcf825f85b0886329fa1bf202dfb70389642e3620c36de6b5b2b5a937f8459dd425de68dce762bd37d2

    • SSDEEP

      12288:lMrRy90GyD7KI4H7tb2IIWOLSVMCt592rwB6eCZanft/juHTFl:UyMGI45Dp4kt5YW6vZyB+H

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks