General

  • Target

    c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef

  • Size

    670KB

  • Sample

    241110-3tc5haxhqb

  • MD5

    f37f9aec58ff6af9d419e6dd428ece8f

  • SHA1

    81bf96262736eaa68205bb576ee07694dc0610ac

  • SHA256

    c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef

  • SHA512

    1b9d6fb095b43a72dc948c44c3a06c4a9a26e1c927963c9f2ca7d2a2459aafd23930bd4f07a7603a03545e9b1910a4c6f256f83fba1d07ab3d34945919d7e395

  • SSDEEP

    12288:aMr6y90Xz5Y9AavBRh+8vPGClolQ07upwoZFiTLt59srw4bXCzapft/ju5jkmVu:cy2z+9Aav7hVXIRQLiTLt52nbyzGB0u

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef

    • Size

      670KB

    • MD5

      f37f9aec58ff6af9d419e6dd428ece8f

    • SHA1

      81bf96262736eaa68205bb576ee07694dc0610ac

    • SHA256

      c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef

    • SHA512

      1b9d6fb095b43a72dc948c44c3a06c4a9a26e1c927963c9f2ca7d2a2459aafd23930bd4f07a7603a03545e9b1910a4c6f256f83fba1d07ab3d34945919d7e395

    • SSDEEP

      12288:aMr6y90Xz5Y9AavBRh+8vPGClolQ07upwoZFiTLt59srw4bXCzapft/ju5jkmVu:cy2z+9Aav7hVXIRQLiTLt52nbyzGB0u

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks