General

  • Target

    d07743d69c248bb4f61ebba836773e775d0feec685a15a4b477429ccafc6de9f

  • Size

    530KB

  • Sample

    241110-15mf7swkfs

  • MD5

    0b6a288932ddf649c9c7eb9e04a0722c

  • SHA1

    87e446cb8758d3e0d4cce7e5684a657e40698d3e

  • SHA256

    d07743d69c248bb4f61ebba836773e775d0feec685a15a4b477429ccafc6de9f

  • SHA512

    8e35c45cbaea1f5966364a60de50d1326c5c3c43791e9dcdb9bc4299d19b57a42270273838e05b390ff446981d547e81726b13fc392cc25b890e827abca4876b

  • SSDEEP

    12288:0Mrwy90OBt6U6x83+DUYf5KXa/3mG7A8zwp:0ye/83gA8mGs8zwp

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      d07743d69c248bb4f61ebba836773e775d0feec685a15a4b477429ccafc6de9f

    • Size

      530KB

    • MD5

      0b6a288932ddf649c9c7eb9e04a0722c

    • SHA1

      87e446cb8758d3e0d4cce7e5684a657e40698d3e

    • SHA256

      d07743d69c248bb4f61ebba836773e775d0feec685a15a4b477429ccafc6de9f

    • SHA512

      8e35c45cbaea1f5966364a60de50d1326c5c3c43791e9dcdb9bc4299d19b57a42270273838e05b390ff446981d547e81726b13fc392cc25b890e827abca4876b

    • SSDEEP

      12288:0Mrwy90OBt6U6x83+DUYf5KXa/3mG7A8zwp:0ye/83gA8mGs8zwp

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks