General

  • Target

    6ce7984da9ed0cb904bbabb3b15c3ee2a5cb7f20afa8fc19e04673346e61d8c9

  • Size

    537KB

  • Sample

    241106-nn6gjaylfy

  • MD5

    bba95ed00397c01db4d0e4c0d5754375

  • SHA1

    6b94bf3d32f276eb36f62b08b62c2ebc19c3c2d9

  • SHA256

    6ce7984da9ed0cb904bbabb3b15c3ee2a5cb7f20afa8fc19e04673346e61d8c9

  • SHA512

    d5059e8a74659ac592f80a8204a48096c82db0eb2b6c99d2d9c05da3baebe6ee686be14c9370634ba0af41d4dfb6d97a9fc7f66f79bdcbd5d2a29f9c05f5a747

  • SSDEEP

    12288:QMrqy90K3yWET9WQ9L6wk2Bpe66LdZpNUIzH5wR4Cq5EJzzkN:qyz3AT9WOd0LdTN1ZwRiWJzzK

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      6ce7984da9ed0cb904bbabb3b15c3ee2a5cb7f20afa8fc19e04673346e61d8c9

    • Size

      537KB

    • MD5

      bba95ed00397c01db4d0e4c0d5754375

    • SHA1

      6b94bf3d32f276eb36f62b08b62c2ebc19c3c2d9

    • SHA256

      6ce7984da9ed0cb904bbabb3b15c3ee2a5cb7f20afa8fc19e04673346e61d8c9

    • SHA512

      d5059e8a74659ac592f80a8204a48096c82db0eb2b6c99d2d9c05da3baebe6ee686be14c9370634ba0af41d4dfb6d97a9fc7f66f79bdcbd5d2a29f9c05f5a747

    • SSDEEP

      12288:QMrqy90K3yWET9WQ9L6wk2Bpe66LdZpNUIzH5wR4Cq5EJzzkN:qyz3AT9WOd0LdTN1ZwRiWJzzK

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks