General

  • Target

    e441de734e98cba65abec444bf89d8f9880cf2f9438c1ede79033167bc9504c7

  • Size

    814KB

  • Sample

    241105-1tmylaynaz

  • MD5

    cbd86c7bea8a501d105a7081a989041e

  • SHA1

    35919d04cfabdb40b8a2afc755ea1d3b636eeb15

  • SHA256

    e441de734e98cba65abec444bf89d8f9880cf2f9438c1ede79033167bc9504c7

  • SHA512

    9bce6c28ff49116817db9a18d0dbe1f125735f25899b55116e3acbd59c748d14a2d2272c57fc01244b828e2afb179fffdec95b3236684db949302c3987d6a52f

  • SSDEEP

    12288:XMrgy90/GGriBOmX3+TKvt4O66GCJqdaMV23SOS0PTlrSmG1R48omiD2:TyQGFX3+WF4P6Zqdaa2nzRNGzomi6

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      e441de734e98cba65abec444bf89d8f9880cf2f9438c1ede79033167bc9504c7

    • Size

      814KB

    • MD5

      cbd86c7bea8a501d105a7081a989041e

    • SHA1

      35919d04cfabdb40b8a2afc755ea1d3b636eeb15

    • SHA256

      e441de734e98cba65abec444bf89d8f9880cf2f9438c1ede79033167bc9504c7

    • SHA512

      9bce6c28ff49116817db9a18d0dbe1f125735f25899b55116e3acbd59c748d14a2d2272c57fc01244b828e2afb179fffdec95b3236684db949302c3987d6a52f

    • SSDEEP

      12288:XMrgy90/GGriBOmX3+TKvt4O66GCJqdaMV23SOS0PTlrSmG1R48omiD2:TyQGFX3+WF4P6Zqdaa2nzRNGzomi6

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks