General

  • Target

    dad83fc4644ce757857d1c690f8f844eec0aba0c12db202ca997c214f9166c24.exe

  • Size

    522KB

  • Sample

    241110-2wtplaxbjl

  • MD5

    3fc4b1b49c7e52b4d6c611d4384849eb

  • SHA1

    38627c90bb175491cec6a1c23c97324ad4f718ff

  • SHA256

    dad83fc4644ce757857d1c690f8f844eec0aba0c12db202ca997c214f9166c24

  • SHA512

    b23a61c65c14ab23c2f7c277ece5c4f095736d24b2f3af344574fb7ce65473c2b8c236e987328fa4e0fdc8ca563cc9f8bd3b641bf709151f20fa0c1c42ee731c

  • SSDEEP

    12288:IMrRy90T7+heYfaBrwJ0M8Gz44IzW7wKovolU8ID:ZyC7+MYfYl9GM4B7fBID

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      dad83fc4644ce757857d1c690f8f844eec0aba0c12db202ca997c214f9166c24.exe

    • Size

      522KB

    • MD5

      3fc4b1b49c7e52b4d6c611d4384849eb

    • SHA1

      38627c90bb175491cec6a1c23c97324ad4f718ff

    • SHA256

      dad83fc4644ce757857d1c690f8f844eec0aba0c12db202ca997c214f9166c24

    • SHA512

      b23a61c65c14ab23c2f7c277ece5c4f095736d24b2f3af344574fb7ce65473c2b8c236e987328fa4e0fdc8ca563cc9f8bd3b641bf709151f20fa0c1c42ee731c

    • SSDEEP

      12288:IMrRy90T7+heYfaBrwJ0M8Gz44IzW7wKovolU8ID:ZyC7+MYfYl9GM4B7fBID

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks