General

  • Target

    799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2

  • Size

    652KB

  • Sample

    241105-2ze1lstjen

  • MD5

    055495c04d477ce63ed5931ee1e023cf

  • SHA1

    d38d5a8cdd9614bf46c420b7127a053b81887842

  • SHA256

    799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2

  • SHA512

    06abcaad1941ceaa8f3f7b835ae5be9e92ce8b385dc62612e9a35f74c7f6ce3af3bfc80b614d3043b6c8f71bbeaab2829e3c87637461e016d5fc4eba2ba234bd

  • SSDEEP

    12288:fMrny90NGFPxUdMOPeu/TKyh6iIrXIPnd5Vokut6Eolc+:MyHtLpmRPd9utIlP

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2

    • Size

      652KB

    • MD5

      055495c04d477ce63ed5931ee1e023cf

    • SHA1

      d38d5a8cdd9614bf46c420b7127a053b81887842

    • SHA256

      799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2

    • SHA512

      06abcaad1941ceaa8f3f7b835ae5be9e92ce8b385dc62612e9a35f74c7f6ce3af3bfc80b614d3043b6c8f71bbeaab2829e3c87637461e016d5fc4eba2ba234bd

    • SSDEEP

      12288:fMrny90NGFPxUdMOPeu/TKyh6iIrXIPnd5Vokut6Eolc+:MyHtLpmRPd9utIlP

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks