General

  • Target

    4976c41a0357e392ef194a7e9bf7068dbb2d97785b6fd6eb26b88e28bfb97359

  • Size

    802KB

  • Sample

    241105-3cc36stmcp

  • MD5

    c2ca53952abce4b049a7860d98a724c4

  • SHA1

    7609b8a405f7fff48f748f8815013567d2939f48

  • SHA256

    4976c41a0357e392ef194a7e9bf7068dbb2d97785b6fd6eb26b88e28bfb97359

  • SHA512

    9b7c57fc580da88a2dbfa97562cc5676babca37630934b919fadcce9046ee0f4dc36785cb8b820ad7073fa4d76b28f315ec99e5e267fb9957da2e8dbd1307ca6

  • SSDEEP

    24576:DyaUxyveRE0KoV8b+CxcjBJlf2yClt5sT65s:WFwzoVuSjBHct5sS

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      4976c41a0357e392ef194a7e9bf7068dbb2d97785b6fd6eb26b88e28bfb97359

    • Size

      802KB

    • MD5

      c2ca53952abce4b049a7860d98a724c4

    • SHA1

      7609b8a405f7fff48f748f8815013567d2939f48

    • SHA256

      4976c41a0357e392ef194a7e9bf7068dbb2d97785b6fd6eb26b88e28bfb97359

    • SHA512

      9b7c57fc580da88a2dbfa97562cc5676babca37630934b919fadcce9046ee0f4dc36785cb8b820ad7073fa4d76b28f315ec99e5e267fb9957da2e8dbd1307ca6

    • SSDEEP

      24576:DyaUxyveRE0KoV8b+CxcjBJlf2yClt5sT65s:WFwzoVuSjBHct5sS

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks