General

  • Target

    4a092f437c21a536ca663016433cc842a80847124b575c913d0bd29492d800d5

  • Size

    926KB

  • Sample

    241104-q17lga1crn

  • MD5

    0af9ddb2bfb51c7d30c20789e8b1b027

  • SHA1

    cee8f44ed5cba084414699306bfb0c5a95555c48

  • SHA256

    4a092f437c21a536ca663016433cc842a80847124b575c913d0bd29492d800d5

  • SHA512

    5518ce30061f6fe27a416c4c6be3bfa3256fe1eeb85ee153563c22f5360ee999f40f1acb379712f90677d3b19e2291a1a6420d346e3166295038fffba87c0ad4

  • SSDEEP

    24576:ZyzDPceHmJX626oZU8/MZ+tVOc3WAPq6J/aVF:MHPc8mJ/x/l/Rug

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

dezik

C2

77.91.124.145:4125

Attributes
  • auth_value

    afab3a79f84bd5003ef2824211bcf14e

Targets

    • Target

      4a092f437c21a536ca663016433cc842a80847124b575c913d0bd29492d800d5

    • Size

      926KB

    • MD5

      0af9ddb2bfb51c7d30c20789e8b1b027

    • SHA1

      cee8f44ed5cba084414699306bfb0c5a95555c48

    • SHA256

      4a092f437c21a536ca663016433cc842a80847124b575c913d0bd29492d800d5

    • SHA512

      5518ce30061f6fe27a416c4c6be3bfa3256fe1eeb85ee153563c22f5360ee999f40f1acb379712f90677d3b19e2291a1a6420d346e3166295038fffba87c0ad4

    • SSDEEP

      24576:ZyzDPceHmJX626oZU8/MZ+tVOc3WAPq6J/aVF:MHPc8mJ/x/l/Rug

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks