General

  • Target

    c26657e58fec2d2790715b9e4009fd269414d6248a725fbd841ac7b7b90ae968

  • Size

    560KB

  • Sample

    241110-1tv9zawcpj

  • MD5

    f00ca342a31cde431bbc8ffaae3f2295

  • SHA1

    93cf5e9480a0e48f85b9b37edbb7a1128a682e9c

  • SHA256

    c26657e58fec2d2790715b9e4009fd269414d6248a725fbd841ac7b7b90ae968

  • SHA512

    d7df52ce49e7d202388b6760beb27df0e48249cef937e0b4527f5f207f51d6c994f09cf266744e27eb293de922060b63d8f265044d8929a9bd246fc1eb7e3d53

  • SSDEEP

    12288:dMrNy902WSwYm0oGOizmxAgE9XPMJ26cEAQylx2Ab7Kh:Ayyu7mxAguE+EAllxK

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      c26657e58fec2d2790715b9e4009fd269414d6248a725fbd841ac7b7b90ae968

    • Size

      560KB

    • MD5

      f00ca342a31cde431bbc8ffaae3f2295

    • SHA1

      93cf5e9480a0e48f85b9b37edbb7a1128a682e9c

    • SHA256

      c26657e58fec2d2790715b9e4009fd269414d6248a725fbd841ac7b7b90ae968

    • SHA512

      d7df52ce49e7d202388b6760beb27df0e48249cef937e0b4527f5f207f51d6c994f09cf266744e27eb293de922060b63d8f265044d8929a9bd246fc1eb7e3d53

    • SSDEEP

      12288:dMrNy902WSwYm0oGOizmxAgE9XPMJ26cEAQylx2Ab7Kh:Ayyu7mxAguE+EAllxK

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks