General

  • Target

    eae58dadc4691205bdda812f8a41a4f3514e0397e045fef1f2c90b529f385059

  • Size

    652KB

  • Sample

    241105-12vcmsypdy

  • MD5

    a4fbccfb98f09d5a5b88d61632164302

  • SHA1

    d4663b8f22b64395d80b5082004963cda8594386

  • SHA256

    eae58dadc4691205bdda812f8a41a4f3514e0397e045fef1f2c90b529f385059

  • SHA512

    c0acc249c6edee021a153d1ba67136b277982d2e89f2f630afaec9ee0414a597feec07c6e55fe9d1e40f236608f6c2bf439efd3aa6d04e821ea3c4142b373e1a

  • SSDEEP

    12288:1MrJy90npVpLckRyoXTBMBNiJrOtPs4lVmDtXeu1sVWCS:MyuzdBmP7ytB

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      eae58dadc4691205bdda812f8a41a4f3514e0397e045fef1f2c90b529f385059

    • Size

      652KB

    • MD5

      a4fbccfb98f09d5a5b88d61632164302

    • SHA1

      d4663b8f22b64395d80b5082004963cda8594386

    • SHA256

      eae58dadc4691205bdda812f8a41a4f3514e0397e045fef1f2c90b529f385059

    • SHA512

      c0acc249c6edee021a153d1ba67136b277982d2e89f2f630afaec9ee0414a597feec07c6e55fe9d1e40f236608f6c2bf439efd3aa6d04e821ea3c4142b373e1a

    • SSDEEP

      12288:1MrJy90npVpLckRyoXTBMBNiJrOtPs4lVmDtXeu1sVWCS:MyuzdBmP7ytB

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks