General

  • Target

    1ee87aaeaa4c5d76d6ceaec86f5d68aab571a4797d401f29f80a0748644ab688

  • Size

    533KB

  • Sample

    241111-a5nfdsxret

  • MD5

    fcf5d696f08ce1017e89ac5bc93f1e75

  • SHA1

    effb0462d73ff1f0eb301c9edaa0198f0ca300ec

  • SHA256

    1ee87aaeaa4c5d76d6ceaec86f5d68aab571a4797d401f29f80a0748644ab688

  • SHA512

    b645d2f82ab67fff00ff503cf0ad7a64fd0d077ecd227ea34ced4cf63a792475ce47e2f64a27cb69f865c9001eb4cb1083f2ecd3ad0be61c18bec0dcae1d10bc

  • SSDEEP

    12288:0MrMy90qDUcFx929csgxyiXexYPBz3G4tzVQGu6Lg74Q3:4yJDjbqcBwiXJPBjR5Q6ccA

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      1ee87aaeaa4c5d76d6ceaec86f5d68aab571a4797d401f29f80a0748644ab688

    • Size

      533KB

    • MD5

      fcf5d696f08ce1017e89ac5bc93f1e75

    • SHA1

      effb0462d73ff1f0eb301c9edaa0198f0ca300ec

    • SHA256

      1ee87aaeaa4c5d76d6ceaec86f5d68aab571a4797d401f29f80a0748644ab688

    • SHA512

      b645d2f82ab67fff00ff503cf0ad7a64fd0d077ecd227ea34ced4cf63a792475ce47e2f64a27cb69f865c9001eb4cb1083f2ecd3ad0be61c18bec0dcae1d10bc

    • SSDEEP

      12288:0MrMy90qDUcFx929csgxyiXexYPBz3G4tzVQGu6Lg74Q3:4yJDjbqcBwiXJPBjR5Q6ccA

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks