General

  • Target

    43caa4f6f4c6daec5a0fb0b21007eb0a0af89ba44ec20cc7b3a7459198dce2c3

  • Size

    561KB

  • Sample

    241110-z7dfmswbmc

  • MD5

    29b8039837a7e7aa28a5004c20cc5ab2

  • SHA1

    64e096245471b97ef26359459a58ff7e3d098d41

  • SHA256

    43caa4f6f4c6daec5a0fb0b21007eb0a0af89ba44ec20cc7b3a7459198dce2c3

  • SHA512

    a32a6e721c9e3ee530a82e4492e0cdd7446a85fb61437ca1808ac0acda3aed9c1a6b9a7f4c4f33fa1ccf82cdafec8e6ebb3d6f9f2e85225639cd33517e4e8436

  • SSDEEP

    12288:pMrQy90JI2S5zmNtyOiurYpEMxJopH55H0hSNKnTju:5yN2uz0f3eEMspH2qAu

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      43caa4f6f4c6daec5a0fb0b21007eb0a0af89ba44ec20cc7b3a7459198dce2c3

    • Size

      561KB

    • MD5

      29b8039837a7e7aa28a5004c20cc5ab2

    • SHA1

      64e096245471b97ef26359459a58ff7e3d098d41

    • SHA256

      43caa4f6f4c6daec5a0fb0b21007eb0a0af89ba44ec20cc7b3a7459198dce2c3

    • SHA512

      a32a6e721c9e3ee530a82e4492e0cdd7446a85fb61437ca1808ac0acda3aed9c1a6b9a7f4c4f33fa1ccf82cdafec8e6ebb3d6f9f2e85225639cd33517e4e8436

    • SSDEEP

      12288:pMrQy90JI2S5zmNtyOiurYpEMxJopH55H0hSNKnTju:5yN2uz0f3eEMspH2qAu

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks