General

  • Target

    9bc722eff2227f76d24cec64904b5fe7bf4a75be2dbd0e554ea0584878f8dbe0

  • Size

    659KB

  • Sample

    241111-bhrpzaygjn

  • MD5

    8531d0d86733c967c2cfada5b7c86894

  • SHA1

    05c5662a06e3677727c890ff2d8089d204133e34

  • SHA256

    9bc722eff2227f76d24cec64904b5fe7bf4a75be2dbd0e554ea0584878f8dbe0

  • SHA512

    640fa398eee3c95b22ebebcd5b971978afdc792df8b531e1eb00c0abba07212350adc4e92eedd67c2a30bf27970a85ddecca6009b4f63d995037bff23d5b4ecf

  • SSDEEP

    12288:fMrSy90qmSqVoXpekx7h85XX6yLTGYJouYdo3WJCgPMHTeHo:hySxoZekc51/GYJoNJCgto

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      9bc722eff2227f76d24cec64904b5fe7bf4a75be2dbd0e554ea0584878f8dbe0

    • Size

      659KB

    • MD5

      8531d0d86733c967c2cfada5b7c86894

    • SHA1

      05c5662a06e3677727c890ff2d8089d204133e34

    • SHA256

      9bc722eff2227f76d24cec64904b5fe7bf4a75be2dbd0e554ea0584878f8dbe0

    • SHA512

      640fa398eee3c95b22ebebcd5b971978afdc792df8b531e1eb00c0abba07212350adc4e92eedd67c2a30bf27970a85ddecca6009b4f63d995037bff23d5b4ecf

    • SSDEEP

      12288:fMrSy90qmSqVoXpekx7h85XX6yLTGYJouYdo3WJCgPMHTeHo:hySxoZekc51/GYJoNJCgto

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks