General

  • Target

    06a8dcb666714fa46e842f34f36c1e26a103fb5930bda93595eb37683aa08f59

  • Size

    794KB

  • Sample

    241105-camxgsvjgj

  • MD5

    20a6fdf6e87615f7f0fe9e183e1f42fc

  • SHA1

    335095e60a41e42d2cb68f0ab41f4a4a8f61acba

  • SHA256

    06a8dcb666714fa46e842f34f36c1e26a103fb5930bda93595eb37683aa08f59

  • SHA512

    932c839b1668df5171703f93c8e0f913ab935ee6601aa0ef9f1665a1fec755d47815557e21b6922e79f5987c0d78e4d57a924f1fe72b8b72e838cbd6a9cf840e

  • SSDEEP

    24576:Ay4v4wIf+A5Ib4scb2n/VAOfdNtJPPOHKfs7gYha:H4v4l+JbjcO3pOHKg

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      06a8dcb666714fa46e842f34f36c1e26a103fb5930bda93595eb37683aa08f59

    • Size

      794KB

    • MD5

      20a6fdf6e87615f7f0fe9e183e1f42fc

    • SHA1

      335095e60a41e42d2cb68f0ab41f4a4a8f61acba

    • SHA256

      06a8dcb666714fa46e842f34f36c1e26a103fb5930bda93595eb37683aa08f59

    • SHA512

      932c839b1668df5171703f93c8e0f913ab935ee6601aa0ef9f1665a1fec755d47815557e21b6922e79f5987c0d78e4d57a924f1fe72b8b72e838cbd6a9cf840e

    • SSDEEP

      24576:Ay4v4wIf+A5Ib4scb2n/VAOfdNtJPPOHKfs7gYha:H4v4l+JbjcO3pOHKg

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks