General

  • Target

    fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925

  • Size

    660KB

  • Sample

    241111-cr3dhazkgv

  • MD5

    1ba6a1b0915311c4e862f47ab7f2a71b

  • SHA1

    bb00f8b88f45a95987a1c1353318dbcda77db1b8

  • SHA256

    fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925

  • SHA512

    3e03c4a027e3cd53bddf923a5d6914b9d2fe63fbec250df3b0c349b490d2783e71d47fe886281258b343205d8451bd24c9117aff93ca511dbfdae68585beb0dc

  • SSDEEP

    12288:zMr0y904glusmcqhVv4lI7bFwlR610V0ifpoY+YfV2KQ:TywlEr7bFz02ieY+YdQ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925

    • Size

      660KB

    • MD5

      1ba6a1b0915311c4e862f47ab7f2a71b

    • SHA1

      bb00f8b88f45a95987a1c1353318dbcda77db1b8

    • SHA256

      fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925

    • SHA512

      3e03c4a027e3cd53bddf923a5d6914b9d2fe63fbec250df3b0c349b490d2783e71d47fe886281258b343205d8451bd24c9117aff93ca511dbfdae68585beb0dc

    • SSDEEP

      12288:zMr0y904glusmcqhVv4lI7bFwlR610V0ifpoY+YfV2KQ:TywlEr7bFz02ieY+YdQ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks