General

  • Target

    87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3

  • Size

    530KB

  • Sample

    241106-vkeb7swpbn

  • MD5

    d055d902b295445945764f210298d115

  • SHA1

    f7d542275036bff431ed93c97ed114b5df5508c1

  • SHA256

    87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3

  • SHA512

    378311eacafe4ca5f7560d3994281f5024e0086a7410f5c8f9bc316ae011202afec9deb5f16dc37b676f8b32aa686682ff0d6f5edc353c202fee7be8b7442085

  • SSDEEP

    12288:pMrGy90U0TzBL6XDqbLCaC9M7hgC00v+7Wwon:7yR0TzIzqbLCVM7ub09won

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3

    • Size

      530KB

    • MD5

      d055d902b295445945764f210298d115

    • SHA1

      f7d542275036bff431ed93c97ed114b5df5508c1

    • SHA256

      87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3

    • SHA512

      378311eacafe4ca5f7560d3994281f5024e0086a7410f5c8f9bc316ae011202afec9deb5f16dc37b676f8b32aa686682ff0d6f5edc353c202fee7be8b7442085

    • SSDEEP

      12288:pMrGy90U0TzBL6XDqbLCaC9M7hgC00v+7Wwon:7yR0TzIzqbLCVM7ub09won

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks