General

  • Target

    40195042bdbaa902373afbee2359de476271bf70dab9813fe4dfa7bdb6640b04.exe

  • Size

    392KB

  • Sample

    241118-pnffsa1pel

  • MD5

    c065b24d70ad37ec4ef889cfcded8b32

  • SHA1

    066e65a67e80116957341567f2080e4acf4878ad

  • SHA256

    40195042bdbaa902373afbee2359de476271bf70dab9813fe4dfa7bdb6640b04

  • SHA512

    d3686e60cf27e9580cc2f691ba4816d32c9a936c5d98b2518845b4f64b84dfbf82116147b4058d5456c566ec7d6622b6a2db89e5a6dd94df7b94412eadacb0fd

  • SSDEEP

    12288:UMr3y90QLR2iDLBcGErp7q6Bizy0Mm/yWpUXLvJ:TyHIglZiKzy0Mm/zpqJ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      40195042bdbaa902373afbee2359de476271bf70dab9813fe4dfa7bdb6640b04.exe

    • Size

      392KB

    • MD5

      c065b24d70ad37ec4ef889cfcded8b32

    • SHA1

      066e65a67e80116957341567f2080e4acf4878ad

    • SHA256

      40195042bdbaa902373afbee2359de476271bf70dab9813fe4dfa7bdb6640b04

    • SHA512

      d3686e60cf27e9580cc2f691ba4816d32c9a936c5d98b2518845b4f64b84dfbf82116147b4058d5456c566ec7d6622b6a2db89e5a6dd94df7b94412eadacb0fd

    • SSDEEP

      12288:UMr3y90QLR2iDLBcGErp7q6Bizy0Mm/yWpUXLvJ:TyHIglZiKzy0Mm/zpqJ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks