General

  • Target

    ecdafdac77d4f70d79317d5f433f753afc60105ef380cf3a6f55746669c928ed

  • Size

    561KB

  • Sample

    241106-pxg1za1bqm

  • MD5

    1eebe9c6f762f9003a8edad00a278d27

  • SHA1

    16760eb0fe41386890c733517d69276dc81dd2c6

  • SHA256

    ecdafdac77d4f70d79317d5f433f753afc60105ef380cf3a6f55746669c928ed

  • SHA512

    ecf4291f26d9dd23c486ce236ce36495cd85492b0c234cd006cc912b5e711213692505a6339e1805c90227f00b06c4289f703b3777a63f70c01a5735ef17ea60

  • SSDEEP

    12288:qMrGy90f2p6QlAR4GIlV4mFv8OuMNf56NmOV:4ypF7G4d8n4fkl

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      ecdafdac77d4f70d79317d5f433f753afc60105ef380cf3a6f55746669c928ed

    • Size

      561KB

    • MD5

      1eebe9c6f762f9003a8edad00a278d27

    • SHA1

      16760eb0fe41386890c733517d69276dc81dd2c6

    • SHA256

      ecdafdac77d4f70d79317d5f433f753afc60105ef380cf3a6f55746669c928ed

    • SHA512

      ecf4291f26d9dd23c486ce236ce36495cd85492b0c234cd006cc912b5e711213692505a6339e1805c90227f00b06c4289f703b3777a63f70c01a5735ef17ea60

    • SSDEEP

      12288:qMrGy90f2p6QlAR4GIlV4mFv8OuMNf56NmOV:4ypF7G4d8n4fkl

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks