General

  • Target

    dd32e4064962ca7269e10ee9ea6033b22897cf7448e957758b8e82f3ba3dbc60

  • Size

    665KB

  • Sample

    241111-a3p67sygmd

  • MD5

    e07fab1631e94a4ace59e06b0fcfd05f

  • SHA1

    c3472ec82d726efc713bc2fbc5db0d5f344e7200

  • SHA256

    dd32e4064962ca7269e10ee9ea6033b22897cf7448e957758b8e82f3ba3dbc60

  • SHA512

    b7dad7aa2a701482806f3274b1c3fe18fe61f6b6200f114cb8d17ad6221f3caddd65fdbd5aa551bdc66e93ad461688b90563de8bb2662e1f5fe9a9af52ccc64f

  • SSDEEP

    12288:JMrEy9040GnPli0OaUoyQsSQ031uP+HmWmCF+O97jOUqGhb6auOXDvP:NyQGdDtUoG03EPomtCL7SUqIuADvP

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      dd32e4064962ca7269e10ee9ea6033b22897cf7448e957758b8e82f3ba3dbc60

    • Size

      665KB

    • MD5

      e07fab1631e94a4ace59e06b0fcfd05f

    • SHA1

      c3472ec82d726efc713bc2fbc5db0d5f344e7200

    • SHA256

      dd32e4064962ca7269e10ee9ea6033b22897cf7448e957758b8e82f3ba3dbc60

    • SHA512

      b7dad7aa2a701482806f3274b1c3fe18fe61f6b6200f114cb8d17ad6221f3caddd65fdbd5aa551bdc66e93ad461688b90563de8bb2662e1f5fe9a9af52ccc64f

    • SSDEEP

      12288:JMrEy9040GnPli0OaUoyQsSQ031uP+HmWmCF+O97jOUqGhb6auOXDvP:NyQGdDtUoG03EPomtCL7SUqIuADvP

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks