General

  • Target

    112afe58c85e0c7eba596f549359916a8e631c0616ef7bc4465800d66d884816.exe

  • Size

    556KB

  • Sample

    241118-lkf2cstfrn

  • MD5

    6a7de74f92fcfc31dab12bbb2a72f88b

  • SHA1

    57f86385bc3e9563c0ca64febc7564b99f7c612c

  • SHA256

    112afe58c85e0c7eba596f549359916a8e631c0616ef7bc4465800d66d884816

  • SHA512

    379b2713501670ca1497c8b5e81f30aaba690811787d85f05fbf35ebcd196c79332bc3527a30744a04d1b0f02a00f0ef9f5eeed6bc6137ae635e1027fc82c7c8

  • SSDEEP

    12288:MMrSy90iNqUPdj2gI5vm1HnCL6pJGjxAxI9grmWD4:+y1PdaN5uS+GjKI9Kr4

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      112afe58c85e0c7eba596f549359916a8e631c0616ef7bc4465800d66d884816.exe

    • Size

      556KB

    • MD5

      6a7de74f92fcfc31dab12bbb2a72f88b

    • SHA1

      57f86385bc3e9563c0ca64febc7564b99f7c612c

    • SHA256

      112afe58c85e0c7eba596f549359916a8e631c0616ef7bc4465800d66d884816

    • SHA512

      379b2713501670ca1497c8b5e81f30aaba690811787d85f05fbf35ebcd196c79332bc3527a30744a04d1b0f02a00f0ef9f5eeed6bc6137ae635e1027fc82c7c8

    • SSDEEP

      12288:MMrSy90iNqUPdj2gI5vm1HnCL6pJGjxAxI9grmWD4:+y1PdaN5uS+GjKI9Kr4

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks