General

  • Target

    6a38c211fac0d15915a15262850208c0d59167b8711851f59dd0ed97a8f976ff

  • Size

    789KB

  • Sample

    241105-3eqr2szpby

  • MD5

    b81f6e6821971540ce796a255e3ddb39

  • SHA1

    2d8984610e9162c38da5d82e4c3ab62cf43c7e1c

  • SHA256

    6a38c211fac0d15915a15262850208c0d59167b8711851f59dd0ed97a8f976ff

  • SHA512

    aeafb5fce7aff96b4eac0ad9a3586ab7e17fea8352fac85042f260407910d14594f13c6866402a35f2782ce1ea9cb150317c9c69df139955e83d4001db90a71f

  • SSDEEP

    12288:SMray90DLKa1CqkB3sL0JgDtyG5IRTBAEDiek/7PsxqV11mhMAc4YG:0yMLK2CX2eQpsaPy8iFrYG

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      6a38c211fac0d15915a15262850208c0d59167b8711851f59dd0ed97a8f976ff

    • Size

      789KB

    • MD5

      b81f6e6821971540ce796a255e3ddb39

    • SHA1

      2d8984610e9162c38da5d82e4c3ab62cf43c7e1c

    • SHA256

      6a38c211fac0d15915a15262850208c0d59167b8711851f59dd0ed97a8f976ff

    • SHA512

      aeafb5fce7aff96b4eac0ad9a3586ab7e17fea8352fac85042f260407910d14594f13c6866402a35f2782ce1ea9cb150317c9c69df139955e83d4001db90a71f

    • SSDEEP

      12288:SMray90DLKa1CqkB3sL0JgDtyG5IRTBAEDiek/7PsxqV11mhMAc4YG:0yMLK2CX2eQpsaPy8iFrYG

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks