General

  • Target

    e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c

  • Size

    559KB

  • Sample

    241111-c7xg7azpbz

  • MD5

    6e98f4137ff00a17797f3bd256ef4695

  • SHA1

    d37295610102bfca21c449e0da66cf996368f12a

  • SHA256

    e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c

  • SHA512

    f7ff390dafb25011904d07af00d3f90e2577c9af7202152d5c44416d0f616096fd03f0c2c2c80b583585e117c3edc56cdc341e7d69d3b3f9ec99f2dca0a30157

  • SSDEEP

    12288:qMrSy90noxlNbclS+gf10eF+PW+320DDd4aO:cyXlVwSBfsPWAtDDyaO

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c

    • Size

      559KB

    • MD5

      6e98f4137ff00a17797f3bd256ef4695

    • SHA1

      d37295610102bfca21c449e0da66cf996368f12a

    • SHA256

      e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c

    • SHA512

      f7ff390dafb25011904d07af00d3f90e2577c9af7202152d5c44416d0f616096fd03f0c2c2c80b583585e117c3edc56cdc341e7d69d3b3f9ec99f2dca0a30157

    • SSDEEP

      12288:qMrSy90noxlNbclS+gf10eF+PW+320DDd4aO:cyXlVwSBfsPWAtDDyaO

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks