General

  • Target

    16165361685b77a485bf99f5463ae20a6d63e72bbda2d095cf96a0995cd4f431

  • Size

    522KB

  • Sample

    241111-azyn6sycqj

  • MD5

    c57182a6fc314cff72e53b64cf58461a

  • SHA1

    5625fcc82bfe9db5480386f1d6c2c8fc119fc7da

  • SHA256

    16165361685b77a485bf99f5463ae20a6d63e72bbda2d095cf96a0995cd4f431

  • SHA512

    c9aac233608e67303c5659f610d4c385359a439ee69be6c30dfbfa623308ee67092afe0e6f3338c537bc4be447dc2401b7f9f0ec0aed9a961f8015084b326761

  • SSDEEP

    6144:K8y+bnr+rp0yN90QEDmqPpGHK/KLEtWmdkJcvPdM7S5wNkTrggv4kt0RtzvdviCI:8Mr/y904JK/KvxJcXqar2ft1+sH2T

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      16165361685b77a485bf99f5463ae20a6d63e72bbda2d095cf96a0995cd4f431

    • Size

      522KB

    • MD5

      c57182a6fc314cff72e53b64cf58461a

    • SHA1

      5625fcc82bfe9db5480386f1d6c2c8fc119fc7da

    • SHA256

      16165361685b77a485bf99f5463ae20a6d63e72bbda2d095cf96a0995cd4f431

    • SHA512

      c9aac233608e67303c5659f610d4c385359a439ee69be6c30dfbfa623308ee67092afe0e6f3338c537bc4be447dc2401b7f9f0ec0aed9a961f8015084b326761

    • SSDEEP

      6144:K8y+bnr+rp0yN90QEDmqPpGHK/KLEtWmdkJcvPdM7S5wNkTrggv4kt0RtzvdviCI:8Mr/y904JK/KvxJcXqar2ft1+sH2T

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks