General

  • Target

    e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27

  • Size

    685KB

  • Sample

    241104-rj642s1cjd

  • MD5

    772105fa7d5785c083d6441fd927d426

  • SHA1

    3be8f16768dcc529c9e7f81eb8e0648f1a59acfd

  • SHA256

    e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27

  • SHA512

    69eeb93b8797707def2fb525902268ed901d52df5183256f9927e1800fd733a68e705bc41f79ac5efdf3aade9f8117b8fd17b9bd86ffd1c17a8a094440c64fe9

  • SSDEEP

    12288:8MrMy90v2qYDw05v4+RfgpVk+7KEiVNLjF2cAJSrlkzrSJYIaHhQ:Ay1qYD7v4+SpyE5iVD25804Ta+

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27

    • Size

      685KB

    • MD5

      772105fa7d5785c083d6441fd927d426

    • SHA1

      3be8f16768dcc529c9e7f81eb8e0648f1a59acfd

    • SHA256

      e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27

    • SHA512

      69eeb93b8797707def2fb525902268ed901d52df5183256f9927e1800fd733a68e705bc41f79ac5efdf3aade9f8117b8fd17b9bd86ffd1c17a8a094440c64fe9

    • SSDEEP

      12288:8MrMy90v2qYDw05v4+RfgpVk+7KEiVNLjF2cAJSrlkzrSJYIaHhQ:Ay1qYD7v4+SpyE5iVD25804Ta+

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks