General

  • Target

    c0eae757a44627c85fea4e2dcefdddaa3bbbbeb285dac8552507d3bc1a0825ab.exe

  • Size

    534KB

  • Sample

    241110-21kx9awpdy

  • MD5

    88827c6e04b53ec49e7a7e6ebd151b69

  • SHA1

    ff798ad1f28af52243eeda085b8462f892b78e44

  • SHA256

    c0eae757a44627c85fea4e2dcefdddaa3bbbbeb285dac8552507d3bc1a0825ab

  • SHA512

    6bdaee2464e996e93bb48e8ac0e8c5d331f074d3e806184df834db50e4838482c465a0db09423c2845c9a55c79ab0f4bf9d21ad83d6b2d41d37ce982fba70de9

  • SSDEEP

    12288:WMrVy909T90oCNzV2erEP70iEygJmoyTTvdIb7dv7:XyTZztED7EygJmoWTlIp7

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      c0eae757a44627c85fea4e2dcefdddaa3bbbbeb285dac8552507d3bc1a0825ab.exe

    • Size

      534KB

    • MD5

      88827c6e04b53ec49e7a7e6ebd151b69

    • SHA1

      ff798ad1f28af52243eeda085b8462f892b78e44

    • SHA256

      c0eae757a44627c85fea4e2dcefdddaa3bbbbeb285dac8552507d3bc1a0825ab

    • SHA512

      6bdaee2464e996e93bb48e8ac0e8c5d331f074d3e806184df834db50e4838482c465a0db09423c2845c9a55c79ab0f4bf9d21ad83d6b2d41d37ce982fba70de9

    • SSDEEP

      12288:WMrVy909T90oCNzV2erEP70iEygJmoyTTvdIb7dv7:XyTZztED7EygJmoWTlIp7

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks