General

  • Target

    e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a

  • Size

    794KB

  • Sample

    241104-say8hssbmk

  • MD5

    0b2e806bbd1000d043fbdbc9a1d7269c

  • SHA1

    54909f834b4868fd37283b3e0d88227b7c589e56

  • SHA256

    e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a

  • SHA512

    c8c7d206c12a6c4da408181149b399854408bfc471eda7ce35e437bddaca0fd44335c90d44861ba4f46ddf2908903b2b6bf19b83e33f8802a881101f70bfd7c9

  • SSDEEP

    24576:HyPiGRrnWX48/NwdO6Y5MdQ2WuACRA5t:SP7mp6dJQ2WvCE

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a

    • Size

      794KB

    • MD5

      0b2e806bbd1000d043fbdbc9a1d7269c

    • SHA1

      54909f834b4868fd37283b3e0d88227b7c589e56

    • SHA256

      e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a

    • SHA512

      c8c7d206c12a6c4da408181149b399854408bfc471eda7ce35e437bddaca0fd44335c90d44861ba4f46ddf2908903b2b6bf19b83e33f8802a881101f70bfd7c9

    • SSDEEP

      24576:HyPiGRrnWX48/NwdO6Y5MdQ2WuACRA5t:SP7mp6dJQ2WvCE

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks