General

  • Target

    e44a3511096b324abaca97a4e3e3bdfaa838acc174315ca8175188d2137cfca3

  • Size

    537KB

  • Sample

    241111-by1mtaspgr

  • MD5

    cacad4e5230e2f23f4e343ff2eab9478

  • SHA1

    afe0d0fdefa4e1dd2b163f271fe99314a780dca3

  • SHA256

    e44a3511096b324abaca97a4e3e3bdfaa838acc174315ca8175188d2137cfca3

  • SHA512

    77f563f695866d1446faec19d9f1461b161416bbc497ec944ed7fdff6de24536c3f9854c804ca4320efd0ef4861743792a9afb981e277341c86968d5fcb47fed

  • SSDEEP

    12288:KMr+y90y/uqhfWA//98dLuDUsQHVwIT91CXQ41v7Y7xpeUPi+L:AycwWU98puDY1wO91QQsvs7xk8xL

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      e44a3511096b324abaca97a4e3e3bdfaa838acc174315ca8175188d2137cfca3

    • Size

      537KB

    • MD5

      cacad4e5230e2f23f4e343ff2eab9478

    • SHA1

      afe0d0fdefa4e1dd2b163f271fe99314a780dca3

    • SHA256

      e44a3511096b324abaca97a4e3e3bdfaa838acc174315ca8175188d2137cfca3

    • SHA512

      77f563f695866d1446faec19d9f1461b161416bbc497ec944ed7fdff6de24536c3f9854c804ca4320efd0ef4861743792a9afb981e277341c86968d5fcb47fed

    • SSDEEP

      12288:KMr+y90y/uqhfWA//98dLuDUsQHVwIT91CXQ41v7Y7xpeUPi+L:AycwWU98puDY1wO91QQsvs7xk8xL

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks