General

  • Target

    30cc0fcbd3c853df48794c5d51f601727b564b8afc652c5b458f18827d9f072e

  • Size

    789KB

  • Sample

    241105-c132dsvpdj

  • MD5

    b35c9eb3d0c99e97cf03f9e275c90f9d

  • SHA1

    08d8d1f9f1ea7cf24ab185129aad990c8ae36b00

  • SHA256

    30cc0fcbd3c853df48794c5d51f601727b564b8afc652c5b458f18827d9f072e

  • SHA512

    a745b14f69e976b833437b7222c497bb86a6857e944688fcb06361bacd11a954ab0ecee33e794d4d0140678e7a85be42f3c68467226b078b98ca3632821b2443

  • SSDEEP

    12288:LMrUy90FOso5wMG+gx+DFLLZO5kQ73t9OILfTzAZBieW1dPswfVrpDKK:fymoWMG+5LNOJZ9tbPP//N

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      30cc0fcbd3c853df48794c5d51f601727b564b8afc652c5b458f18827d9f072e

    • Size

      789KB

    • MD5

      b35c9eb3d0c99e97cf03f9e275c90f9d

    • SHA1

      08d8d1f9f1ea7cf24ab185129aad990c8ae36b00

    • SHA256

      30cc0fcbd3c853df48794c5d51f601727b564b8afc652c5b458f18827d9f072e

    • SHA512

      a745b14f69e976b833437b7222c497bb86a6857e944688fcb06361bacd11a954ab0ecee33e794d4d0140678e7a85be42f3c68467226b078b98ca3632821b2443

    • SSDEEP

      12288:LMrUy90FOso5wMG+gx+DFLLZO5kQ73t9OILfTzAZBieW1dPswfVrpDKK:fymoWMG+5LNOJZ9tbPP//N

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks