General

  • Target

    c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5

  • Size

    660KB

  • Sample

    241106-v43txavanf

  • MD5

    e60c6467a07ce705cc193474936f95f1

  • SHA1

    239493ead8b53b1895f2eb9d7b7285830c8c0bdc

  • SHA256

    c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5

  • SHA512

    6386985d9b26f78124f0bf079fe46a85673eda35c74ea1307f31f730732b1eb37336787b03f99b6c670aa24ead00cf94939be6c078769420b5038df1d1d9bb19

  • SSDEEP

    12288:FMrly90DxoUNqrBINKpuPSYPIaevIJUaA7EUFwlRir0V3ifWe:4yXriyZYXuuUFF0tiOe

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5

    • Size

      660KB

    • MD5

      e60c6467a07ce705cc193474936f95f1

    • SHA1

      239493ead8b53b1895f2eb9d7b7285830c8c0bdc

    • SHA256

      c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5

    • SHA512

      6386985d9b26f78124f0bf079fe46a85673eda35c74ea1307f31f730732b1eb37336787b03f99b6c670aa24ead00cf94939be6c078769420b5038df1d1d9bb19

    • SSDEEP

      12288:FMrly90DxoUNqrBINKpuPSYPIaevIJUaA7EUFwlRir0V3ifWe:4yXriyZYXuuUFF0tiOe

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks