General

  • Target

    d17c5a18a3ec1f3a6e393ef093f4125864b09c0ece056aa8a6660a4eea141c88

  • Size

    522KB

  • Sample

    241106-r3v6wssbmb

  • MD5

    888ea3c7299db5c479a1b216e37b9eed

  • SHA1

    5583fdac449a6d6a8ea97d63ad4a07a86a364e14

  • SHA256

    d17c5a18a3ec1f3a6e393ef093f4125864b09c0ece056aa8a6660a4eea141c88

  • SHA512

    246dedb53bcef44c2b2483370b5bff33ce09b5c3b2c48875717cf7b8c2b5e8ff485a4c4b41ecf132bda3681da95d7f9440551e002508bafb7546133dbf234d3b

  • SSDEEP

    12288:GMrTy90+uvNzUZh9u35sRrLipzv0+3QS:dyD9/uJsR6pdf

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      d17c5a18a3ec1f3a6e393ef093f4125864b09c0ece056aa8a6660a4eea141c88

    • Size

      522KB

    • MD5

      888ea3c7299db5c479a1b216e37b9eed

    • SHA1

      5583fdac449a6d6a8ea97d63ad4a07a86a364e14

    • SHA256

      d17c5a18a3ec1f3a6e393ef093f4125864b09c0ece056aa8a6660a4eea141c88

    • SHA512

      246dedb53bcef44c2b2483370b5bff33ce09b5c3b2c48875717cf7b8c2b5e8ff485a4c4b41ecf132bda3681da95d7f9440551e002508bafb7546133dbf234d3b

    • SSDEEP

      12288:GMrTy90+uvNzUZh9u35sRrLipzv0+3QS:dyD9/uJsR6pdf

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks