General

  • Target

    1a55ceebc680ab1962a8ebc20831cd5a6ab90c20da2b79518995a0285fb48b89

  • Size

    699KB

  • Sample

    241110-as1j7awapd

  • MD5

    50cbafa870911ea0a75cb9a2d38db6d6

  • SHA1

    aaf59edd1911ed2628d6db4cb44faea4a50d88e8

  • SHA256

    1a55ceebc680ab1962a8ebc20831cd5a6ab90c20da2b79518995a0285fb48b89

  • SHA512

    eec683c180de96e41eb07d7bc897c2b2f4dec3c645cbfeb21df46ed1c89c040737370b1117a924193ce8948f5e89136d3cc35dc326651f2f8c58df0fcff59588

  • SSDEEP

    12288:PMrLy90SUmo2UsQJicBUOyre0suO6ekI4btrMYNwPSmL+r2Z0qKsrfCdbsWC:MyJSsQ4O1Vu3ldbtrMYNASU9KsIxC

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      1a55ceebc680ab1962a8ebc20831cd5a6ab90c20da2b79518995a0285fb48b89

    • Size

      699KB

    • MD5

      50cbafa870911ea0a75cb9a2d38db6d6

    • SHA1

      aaf59edd1911ed2628d6db4cb44faea4a50d88e8

    • SHA256

      1a55ceebc680ab1962a8ebc20831cd5a6ab90c20da2b79518995a0285fb48b89

    • SHA512

      eec683c180de96e41eb07d7bc897c2b2f4dec3c645cbfeb21df46ed1c89c040737370b1117a924193ce8948f5e89136d3cc35dc326651f2f8c58df0fcff59588

    • SSDEEP

      12288:PMrLy90SUmo2UsQJicBUOyre0suO6ekI4btrMYNwPSmL+r2Z0qKsrfCdbsWC:MyJSsQ4O1Vu3ldbtrMYNASU9KsIxC

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks