General

  • Target

    2c1c4451f35ac9571530760b98711117e0685c786d1f5bc434583bec5f022da9

  • Size

    650KB

  • Sample

    241105-dpbcnstare

  • MD5

    ba55f2c46ed002147eeeb84170c88d3a

  • SHA1

    82e62f0a993f3930752e640a7a10694601c675aa

  • SHA256

    2c1c4451f35ac9571530760b98711117e0685c786d1f5bc434583bec5f022da9

  • SHA512

    42528c4dcf26981b72fa88cd9b39cce902bdfb22ac0eccd72efb5fd69a73af0639dd194d578e62d863628469ad5a42af9589a9b3e0a1d56e363b765953408652

  • SSDEEP

    12288:IMrhy904DZhOVGxku4xu9TKxvza/3LUlISktucgMk/U:JyIGx8u9TKxv+/3LkuucgMqU

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      2c1c4451f35ac9571530760b98711117e0685c786d1f5bc434583bec5f022da9

    • Size

      650KB

    • MD5

      ba55f2c46ed002147eeeb84170c88d3a

    • SHA1

      82e62f0a993f3930752e640a7a10694601c675aa

    • SHA256

      2c1c4451f35ac9571530760b98711117e0685c786d1f5bc434583bec5f022da9

    • SHA512

      42528c4dcf26981b72fa88cd9b39cce902bdfb22ac0eccd72efb5fd69a73af0639dd194d578e62d863628469ad5a42af9589a9b3e0a1d56e363b765953408652

    • SSDEEP

      12288:IMrhy904DZhOVGxku4xu9TKxvza/3LUlISktucgMk/U:JyIGx8u9TKxv+/3LkuucgMqU

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks