General

  • Target

    b052a8b2ff008e4526590bb37a655a0666345a20ff6772c7f7ab078ba40c2962

  • Size

    659KB

  • Sample

    241106-ly4pksyajh

  • MD5

    3b7e309db23214d78cf3d9d37ebf7578

  • SHA1

    ad9243e491078d647874004be192d106e59c95be

  • SHA256

    b052a8b2ff008e4526590bb37a655a0666345a20ff6772c7f7ab078ba40c2962

  • SHA512

    c06b98b3a338f230db76da15446f7fcb1e9a8ceec88b29a18417d35c88f30f492d4e0dfc4e29e1b7de25311e74dd9247cd891703d2ad66f63fd564171a0cf444

  • SSDEEP

    12288:UMrHy90q8X5eWAniAC4D5qMZig1kof5KTa/vmjzDmEXkLV5sFH:TyHYJgDwMZig19A0mjGEXnV

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      b052a8b2ff008e4526590bb37a655a0666345a20ff6772c7f7ab078ba40c2962

    • Size

      659KB

    • MD5

      3b7e309db23214d78cf3d9d37ebf7578

    • SHA1

      ad9243e491078d647874004be192d106e59c95be

    • SHA256

      b052a8b2ff008e4526590bb37a655a0666345a20ff6772c7f7ab078ba40c2962

    • SHA512

      c06b98b3a338f230db76da15446f7fcb1e9a8ceec88b29a18417d35c88f30f492d4e0dfc4e29e1b7de25311e74dd9247cd891703d2ad66f63fd564171a0cf444

    • SSDEEP

      12288:UMrHy90q8X5eWAniAC4D5qMZig1kof5KTa/vmjzDmEXkLV5sFH:TyHYJgDwMZig19A0mjGEXnV

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks