General

  • Target

    445f1c4ae882368c8c85b79d61d4d645e202a5a0d646ef231be103f1b98590ecN.exe

  • Size

    394KB

  • Sample

    241119-vbf5faycjg

  • MD5

    0c449b63eaadd97b37c6e83730fbc840

  • SHA1

    fac197136dc2ec0ed3cac6fb8589c0576c2652c3

  • SHA256

    445f1c4ae882368c8c85b79d61d4d645e202a5a0d646ef231be103f1b98590ec

  • SHA512

    81f49072ccfb4bf303a810d801e74ceed99ff3c19c8d9319cd1cef0853a843802859bdc07fda108eb226a9135d231e9c2b7321dad3a7290b12b2274525aa7651

  • SSDEEP

    6144:KDy+bnr+Rp0yN90QE6l3Iqp66uwD8NjjO2daa98X7jx6HrfhJkI0i:RMrhy904l4VNHzway4L5X0i

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      445f1c4ae882368c8c85b79d61d4d645e202a5a0d646ef231be103f1b98590ecN.exe

    • Size

      394KB

    • MD5

      0c449b63eaadd97b37c6e83730fbc840

    • SHA1

      fac197136dc2ec0ed3cac6fb8589c0576c2652c3

    • SHA256

      445f1c4ae882368c8c85b79d61d4d645e202a5a0d646ef231be103f1b98590ec

    • SHA512

      81f49072ccfb4bf303a810d801e74ceed99ff3c19c8d9319cd1cef0853a843802859bdc07fda108eb226a9135d231e9c2b7321dad3a7290b12b2274525aa7651

    • SSDEEP

      6144:KDy+bnr+Rp0yN90QE6l3Iqp66uwD8NjjO2daa98X7jx6HrfhJkI0i:RMrhy904l4VNHzway4L5X0i

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks