General

  • Target

    3f7c3160b67958ae499b11e230188edd37d9a1a1fc8b21287cc327ff571da12a

  • Size

    684KB

  • Sample

    241105-2w8hrazgpa

  • MD5

    1b43cdb7d318e6dde3ee87773ff46e2f

  • SHA1

    735d2e5f724f09d411fc0441cb5f6a8c4a9ff11b

  • SHA256

    3f7c3160b67958ae499b11e230188edd37d9a1a1fc8b21287cc327ff571da12a

  • SHA512

    3eadd38fa6d445f56d40eca77fef84de33e31b6ccfbe98c90be501758173acc841d43096c5f4a3b83e723ee4f0628ec6f3906eafd39f2003ba9b2ff54f50f0bd

  • SSDEEP

    12288:7MrOy90u0FR7MM/+FNdk4blg2jkWSSzlUrSlP/BCiMuR8a:JysHqrnbC2Tty+9Bua

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      3f7c3160b67958ae499b11e230188edd37d9a1a1fc8b21287cc327ff571da12a

    • Size

      684KB

    • MD5

      1b43cdb7d318e6dde3ee87773ff46e2f

    • SHA1

      735d2e5f724f09d411fc0441cb5f6a8c4a9ff11b

    • SHA256

      3f7c3160b67958ae499b11e230188edd37d9a1a1fc8b21287cc327ff571da12a

    • SHA512

      3eadd38fa6d445f56d40eca77fef84de33e31b6ccfbe98c90be501758173acc841d43096c5f4a3b83e723ee4f0628ec6f3906eafd39f2003ba9b2ff54f50f0bd

    • SSDEEP

      12288:7MrOy90u0FR7MM/+FNdk4blg2jkWSSzlUrSlP/BCiMuR8a:JysHqrnbC2Tty+9Bua

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks