General

  • Target

    a70371606b139a4bf15837a7a0f57340754fa898e9d34b1b239d3e683a21d125

  • Size

    536KB

  • Sample

    241106-rpjwpsscqk

  • MD5

    ee02781e8f3c4f1fe8d66f692a02abce

  • SHA1

    8e5ba19bf74c9967ba53a18c4d55497bd03e16c4

  • SHA256

    a70371606b139a4bf15837a7a0f57340754fa898e9d34b1b239d3e683a21d125

  • SHA512

    d14b1e8eb45201b0c6c0d1ddfd6f2c29f3dbba544febcbad31da2eb56259ce51616f7fc7e4baba66832f19e0b485e7bd75ca5654578a3ac02e92a115a1beded2

  • SSDEEP

    12288:3Mrcy902GdfLXgx2YE8wFOvu7AN3zxPsULITSp/HkT:vyeDd0vu7AN36UVGT

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      a70371606b139a4bf15837a7a0f57340754fa898e9d34b1b239d3e683a21d125

    • Size

      536KB

    • MD5

      ee02781e8f3c4f1fe8d66f692a02abce

    • SHA1

      8e5ba19bf74c9967ba53a18c4d55497bd03e16c4

    • SHA256

      a70371606b139a4bf15837a7a0f57340754fa898e9d34b1b239d3e683a21d125

    • SHA512

      d14b1e8eb45201b0c6c0d1ddfd6f2c29f3dbba544febcbad31da2eb56259ce51616f7fc7e4baba66832f19e0b485e7bd75ca5654578a3ac02e92a115a1beded2

    • SSDEEP

      12288:3Mrcy902GdfLXgx2YE8wFOvu7AN3zxPsULITSp/HkT:vyeDd0vu7AN36UVGT

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks