General

  • Target

    7abf36a9f967515668a022bb920470f81f464526acdd31edeba6a97f37afac8f

  • Size

    662KB

  • Sample

    241110-3sz8msxhpf

  • MD5

    3b0fefce5e68f61387c59af2db1a3820

  • SHA1

    2ad1d6bf68b09472bff2a2c00c3e88cc80f63eee

  • SHA256

    7abf36a9f967515668a022bb920470f81f464526acdd31edeba6a97f37afac8f

  • SHA512

    039180dc24db80241a901f69f96576b050669378a78993827cd91a17374e49d96b01a1c0a9f130c1c168723f3afc45b97866c2a70066d1c2ef9de5a1c7b20b35

  • SSDEEP

    12288:UMrYy90aH5qRzrcx+y8naAcUOPB3By3+L2qJZexGf7HOKp05:syjHQzrpBneUB3+L2qJYxw7HOKm5

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      7abf36a9f967515668a022bb920470f81f464526acdd31edeba6a97f37afac8f

    • Size

      662KB

    • MD5

      3b0fefce5e68f61387c59af2db1a3820

    • SHA1

      2ad1d6bf68b09472bff2a2c00c3e88cc80f63eee

    • SHA256

      7abf36a9f967515668a022bb920470f81f464526acdd31edeba6a97f37afac8f

    • SHA512

      039180dc24db80241a901f69f96576b050669378a78993827cd91a17374e49d96b01a1c0a9f130c1c168723f3afc45b97866c2a70066d1c2ef9de5a1c7b20b35

    • SSDEEP

      12288:UMrYy90aH5qRzrcx+y8naAcUOPB3By3+L2qJZexGf7HOKp05:syjHQzrpBneUB3+L2qJYxw7HOKm5

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks