General

  • Target

    15dab570b7925b4068bb95808ff69fc7e33b46d14b6ea6eef27c690b13b30dd5

  • Size

    689KB

  • Sample

    241111-ccf7qayqgz

  • MD5

    6ab6085373c94c50c83e01c8e614eef7

  • SHA1

    c82e4bb09dd06224bb7ecd0b638f05187725266c

  • SHA256

    15dab570b7925b4068bb95808ff69fc7e33b46d14b6ea6eef27c690b13b30dd5

  • SHA512

    13e5904134a8dbb82a72890c6ace75f5059afb7fb99964742095fdc485fafdca43edfbd390938f0663349421b19fb8db665292cb1627dc8d33f110831a2a82d7

  • SSDEEP

    12288:oMrxy90GXz6FubYqomGj3JeylgG1lvaNtZDce6mzkqGNMEyEvxJmR/4FiR9yAI:ZyhDBkqMkyfliNtZDceXGNlyEvSRRR98

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      15dab570b7925b4068bb95808ff69fc7e33b46d14b6ea6eef27c690b13b30dd5

    • Size

      689KB

    • MD5

      6ab6085373c94c50c83e01c8e614eef7

    • SHA1

      c82e4bb09dd06224bb7ecd0b638f05187725266c

    • SHA256

      15dab570b7925b4068bb95808ff69fc7e33b46d14b6ea6eef27c690b13b30dd5

    • SHA512

      13e5904134a8dbb82a72890c6ace75f5059afb7fb99964742095fdc485fafdca43edfbd390938f0663349421b19fb8db665292cb1627dc8d33f110831a2a82d7

    • SSDEEP

      12288:oMrxy90GXz6FubYqomGj3JeylgG1lvaNtZDce6mzkqGNMEyEvxJmR/4FiR9yAI:ZyhDBkqMkyfliNtZDceXGNlyEvSRRR98

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks