General

  • Target

    WX3.exe

  • Size

    916KB

  • Sample

    240126-x6nh4sebfq

  • MD5

    9ac6079806fb87b0f396b7af773db257

  • SHA1

    ef3ad6fe0aa54146701c57424d0efb6b62abdb6c

  • SHA256

    cd6b42df418c54a291b058fd2900cc3d2519376461a9d1a11b108f3a389caab9

  • SHA512

    3b68b75593d22bec2b12bde480ab7c434a9c47cdc90fc79a23a6744ba7027a376bbce9809b18e09e290627cee122952b8a57598ffcaf4bc38698a19eebc82a63

  • SSDEEP

    12288:2Mrby906ebnGZA2B4FGP25i6A24wVkI3LFacF48DTwWYIierlXPsw1VUyz6WfbVF:tyS92B32Uu4wiAHxPxLnirC

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

maxi

C2

77.91.124.145:4125

Attributes
  • auth_value

    6e90da232d4c2e35c1a36c250f5f8904

Targets

    • Target

      WX3.exe

    • Size

      916KB

    • MD5

      9ac6079806fb87b0f396b7af773db257

    • SHA1

      ef3ad6fe0aa54146701c57424d0efb6b62abdb6c

    • SHA256

      cd6b42df418c54a291b058fd2900cc3d2519376461a9d1a11b108f3a389caab9

    • SHA512

      3b68b75593d22bec2b12bde480ab7c434a9c47cdc90fc79a23a6744ba7027a376bbce9809b18e09e290627cee122952b8a57598ffcaf4bc38698a19eebc82a63

    • SSDEEP

      12288:2Mrby906ebnGZA2B4FGP25i6A24wVkI3LFacF48DTwWYIierlXPsw1VUyz6WfbVF:tyS92B32Uu4wiAHxPxLnirC

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks