General

  • Target

    840b6ece233e70b917152280a5d9464656cc69b5bb7f40080dfdd066f1732abe

  • Size

    522KB

  • Sample

    241110-3qxpqsxhkg

  • MD5

    da147d92e312b6cd34fc188328f74a99

  • SHA1

    8e6cbdb9a3722814c3e992a7fdb1f2e3619fcf66

  • SHA256

    840b6ece233e70b917152280a5d9464656cc69b5bb7f40080dfdd066f1732abe

  • SHA512

    1792f4b4593a1c3aebfa4cadae851f5bf62ad2adbd6a89822704dd158aba5d34e35231614f3e447f4c9ad0a8cd6d482e4a42a687281100c0b4b17ab22c49f5eb

  • SSDEEP

    12288:aMrxy90Cj9L6NYjTslxrhJEOM5gg76dm4q1oNJLFy1Up:DynjMvJvug86DPFN

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      840b6ece233e70b917152280a5d9464656cc69b5bb7f40080dfdd066f1732abe

    • Size

      522KB

    • MD5

      da147d92e312b6cd34fc188328f74a99

    • SHA1

      8e6cbdb9a3722814c3e992a7fdb1f2e3619fcf66

    • SHA256

      840b6ece233e70b917152280a5d9464656cc69b5bb7f40080dfdd066f1732abe

    • SHA512

      1792f4b4593a1c3aebfa4cadae851f5bf62ad2adbd6a89822704dd158aba5d34e35231614f3e447f4c9ad0a8cd6d482e4a42a687281100c0b4b17ab22c49f5eb

    • SSDEEP

      12288:aMrxy90Cj9L6NYjTslxrhJEOM5gg76dm4q1oNJLFy1Up:DynjMvJvug86DPFN

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks