General

  • Target

    3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d

  • Size

    815KB

  • Sample

    241105-1xpxcszfrj

  • MD5

    c8686cc5613060cf6d3d461a8c2c5221

  • SHA1

    0806f72e6442246fcb9bee7aaa44f37aab87a3c9

  • SHA256

    3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d

  • SHA512

    b62f30f04d3d24bc4e2847ed225e9498592b5e406d405686e622bda276ec8a75cbb262b178f4b0d20af21c1966d42ab23d3d087190ff6575da6ecac5b0289bb8

  • SSDEEP

    12288:wMrKy90+YHGsT/fWypwN2dcdi2AugS4TPJrS1Nr0YOw:qy0GIxpa2dck2KHV6low

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d

    • Size

      815KB

    • MD5

      c8686cc5613060cf6d3d461a8c2c5221

    • SHA1

      0806f72e6442246fcb9bee7aaa44f37aab87a3c9

    • SHA256

      3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d

    • SHA512

      b62f30f04d3d24bc4e2847ed225e9498592b5e406d405686e622bda276ec8a75cbb262b178f4b0d20af21c1966d42ab23d3d087190ff6575da6ecac5b0289bb8

    • SSDEEP

      12288:wMrKy90+YHGsT/fWypwN2dcdi2AugS4TPJrS1Nr0YOw:qy0GIxpa2dck2KHV6low

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks