General

  • Target

    d6ab99a55ca403bb9dfcf4e32842c368f399f28ad0e66b49e72f542dcadeaaa5

  • Size

    530KB

  • Sample

    241106-vvy5cstlax

  • MD5

    50c6ec906d6c84b92ecdce4be3bb2188

  • SHA1

    f1b4194198e65eaa52a203f2b663f38692179c1b

  • SHA256

    d6ab99a55ca403bb9dfcf4e32842c368f399f28ad0e66b49e72f542dcadeaaa5

  • SHA512

    69b15576567054edc6d52aedc43bcb119bd83d53a896ace94ebf6b44ca2798c851bb970b42c92a868a567dbcae63c0eccf580c0d46de9d0e3a10cc88b51622d8

  • SSDEEP

    12288:dMrGy90vcBsIkGilWPlM7lj9YH8f5KXa/X44cRrhYzq:7yYcBvXPPs91AI44cRrhH

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      d6ab99a55ca403bb9dfcf4e32842c368f399f28ad0e66b49e72f542dcadeaaa5

    • Size

      530KB

    • MD5

      50c6ec906d6c84b92ecdce4be3bb2188

    • SHA1

      f1b4194198e65eaa52a203f2b663f38692179c1b

    • SHA256

      d6ab99a55ca403bb9dfcf4e32842c368f399f28ad0e66b49e72f542dcadeaaa5

    • SHA512

      69b15576567054edc6d52aedc43bcb119bd83d53a896ace94ebf6b44ca2798c851bb970b42c92a868a567dbcae63c0eccf580c0d46de9d0e3a10cc88b51622d8

    • SSDEEP

      12288:dMrGy90vcBsIkGilWPlM7lj9YH8f5KXa/X44cRrhYzq:7yYcBvXPPs91AI44cRrhH

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks