General

  • Target

    6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65

  • Size

    685KB

  • Sample

    241104-ry6f3atpdp

  • MD5

    7ecbde67ff3cc96990bf7acca0b4ee15

  • SHA1

    0c9f08233715b157aff4ff2f0e84f3865f84220f

  • SHA256

    6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65

  • SHA512

    9b185b1d8690f2e2b1f709a0c3d4e1f59ea20e64d820b6f9aa5d0c7505a86ebdbdd37971c9ed92c1d864f2f1c072651c0256e8d0a1ce88c6d4c7ae28fd25e6f2

  • SSDEEP

    12288:xMr2y90cB6aaC8Dxw1H0y4/vGYIpO/n92qGMSbjb/rS3iRhwkq6ka:Xyt/l8Nwp0p/OY792UofHRX//

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65

    • Size

      685KB

    • MD5

      7ecbde67ff3cc96990bf7acca0b4ee15

    • SHA1

      0c9f08233715b157aff4ff2f0e84f3865f84220f

    • SHA256

      6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65

    • SHA512

      9b185b1d8690f2e2b1f709a0c3d4e1f59ea20e64d820b6f9aa5d0c7505a86ebdbdd37971c9ed92c1d864f2f1c072651c0256e8d0a1ce88c6d4c7ae28fd25e6f2

    • SSDEEP

      12288:xMr2y90cB6aaC8Dxw1H0y4/vGYIpO/n92qGMSbjb/rS3iRhwkq6ka:Xyt/l8Nwp0p/OY792UofHRX//

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks