General

  • Target

    903bf0e6c779503b8de39bf3791967dbd9dad7dbb339fc178d5f34733882fa05

  • Size

    531KB

  • Sample

    241111-bsl78syhnj

  • MD5

    fb9045cfdb863c373287ebb09f997e4e

  • SHA1

    f590ce43f4b81ca2c662c2ccb891903a9cfaee12

  • SHA256

    903bf0e6c779503b8de39bf3791967dbd9dad7dbb339fc178d5f34733882fa05

  • SHA512

    39ae9bc35d75371368c3a49604d4c8a1ea63d29d0141f48201eb7d825e45102dc3ca3f25e1f3e5eed69253f4afcb8c05a60c1028b7af2c497192188421841468

  • SSDEEP

    12288:PMr+y90V/ACE/ytCxh4gs7Js38AXkAxj1QpqBSyREsYt:pyak/14g1/ZQYbasYt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      903bf0e6c779503b8de39bf3791967dbd9dad7dbb339fc178d5f34733882fa05

    • Size

      531KB

    • MD5

      fb9045cfdb863c373287ebb09f997e4e

    • SHA1

      f590ce43f4b81ca2c662c2ccb891903a9cfaee12

    • SHA256

      903bf0e6c779503b8de39bf3791967dbd9dad7dbb339fc178d5f34733882fa05

    • SHA512

      39ae9bc35d75371368c3a49604d4c8a1ea63d29d0141f48201eb7d825e45102dc3ca3f25e1f3e5eed69253f4afcb8c05a60c1028b7af2c497192188421841468

    • SSDEEP

      12288:PMr+y90V/ACE/ytCxh4gs7Js38AXkAxj1QpqBSyREsYt:pyak/14g1/ZQYbasYt

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks