General

  • Target

    fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b

  • Size

    660KB

  • Sample

    241110-3q2zfsxhlb

  • MD5

    621144a709582592e198bfb060fd7261

  • SHA1

    0aee31ed1439b7eeb39e3ad76d80e2532162711f

  • SHA256

    fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b

  • SHA512

    c9cc9b3bb9aadcaca3867e325a91820e9220cf65018dd88b2304eca3c687fe056e19c5d4e0f6a44dbdc9848e2402a66ecfb79e49b06fb21b4aafcfc55f041545

  • SSDEEP

    12288:VMrAy90siQhiy07uoJ4n2GypzE5VfaaycsOFBlRzEiA2/z:9yq1SaEFFsOFGiNr

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b

    • Size

      660KB

    • MD5

      621144a709582592e198bfb060fd7261

    • SHA1

      0aee31ed1439b7eeb39e3ad76d80e2532162711f

    • SHA256

      fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b

    • SHA512

      c9cc9b3bb9aadcaca3867e325a91820e9220cf65018dd88b2304eca3c687fe056e19c5d4e0f6a44dbdc9848e2402a66ecfb79e49b06fb21b4aafcfc55f041545

    • SSDEEP

      12288:VMrAy90siQhiy07uoJ4n2GypzE5VfaaycsOFBlRzEiA2/z:9yq1SaEFFsOFGiNr

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks