General

  • Target

    ade9c7c9d0e6fab95da28389189fac7c5ddb5e406a3cc600b91cfd330b9e4220

  • Size

    560KB

  • Sample

    241110-3qe5paxjhx

  • MD5

    5f7b7c79133a8490d207db7c282d7c28

  • SHA1

    d5954f7fdc0cfcb86653bef7a46c3a1c235613ac

  • SHA256

    ade9c7c9d0e6fab95da28389189fac7c5ddb5e406a3cc600b91cfd330b9e4220

  • SHA512

    04eb0982e4273e73d1635ec538b8a9dfd69b270b34a9608d76fbe63a2d72ef1713b3d63f4ef4fb9b00e71277bd4dd61b32b7abe122c556336ce2fb311b73bc54

  • SSDEEP

    6144:KRy+bnr+2p0yN90QEjrvjLA25mZFzAeC0KqPXuCUcUF6w63ABnUQ+t+0PAQmDc8o:/Mriy90drvH5yFzJKG8LUQXNasMS0

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      ade9c7c9d0e6fab95da28389189fac7c5ddb5e406a3cc600b91cfd330b9e4220

    • Size

      560KB

    • MD5

      5f7b7c79133a8490d207db7c282d7c28

    • SHA1

      d5954f7fdc0cfcb86653bef7a46c3a1c235613ac

    • SHA256

      ade9c7c9d0e6fab95da28389189fac7c5ddb5e406a3cc600b91cfd330b9e4220

    • SHA512

      04eb0982e4273e73d1635ec538b8a9dfd69b270b34a9608d76fbe63a2d72ef1713b3d63f4ef4fb9b00e71277bd4dd61b32b7abe122c556336ce2fb311b73bc54

    • SSDEEP

      6144:KRy+bnr+2p0yN90QEjrvjLA25mZFzAeC0KqPXuCUcUF6w63ABnUQ+t+0PAQmDc8o:/Mriy90drvH5yFzJKG8LUQXNasMS0

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks