General

  • Target

    60dd05dbe9ed6c3923fae80ec068520c27df3ab009407384be98553a8d9008ff

  • Size

    790KB

  • Sample

    241105-ehk4zawpek

  • MD5

    2645c7bdb37789130c6e103508811505

  • SHA1

    8da533b7740b47c0093673804c37fd49fd21da08

  • SHA256

    60dd05dbe9ed6c3923fae80ec068520c27df3ab009407384be98553a8d9008ff

  • SHA512

    f7fee7f98a2c3927af880bd92fc7dda51f03ea5576a8706dfe7793ea743ad77be1dbd5c5ebd218066730a3c88abda00bc9ecb2a48fde29b98a11c68c63c61d8b

  • SSDEEP

    12288:8Mrey9011qwDF3RpUH3osLuCbnCa8+eHTpA4NiezvlPsFybIUZhntW6Lk:ayREpUJTLH8+ezNPIybIUbNLk

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      60dd05dbe9ed6c3923fae80ec068520c27df3ab009407384be98553a8d9008ff

    • Size

      790KB

    • MD5

      2645c7bdb37789130c6e103508811505

    • SHA1

      8da533b7740b47c0093673804c37fd49fd21da08

    • SHA256

      60dd05dbe9ed6c3923fae80ec068520c27df3ab009407384be98553a8d9008ff

    • SHA512

      f7fee7f98a2c3927af880bd92fc7dda51f03ea5576a8706dfe7793ea743ad77be1dbd5c5ebd218066730a3c88abda00bc9ecb2a48fde29b98a11c68c63c61d8b

    • SSDEEP

      12288:8Mrey9011qwDF3RpUH3osLuCbnCa8+eHTpA4NiezvlPsFybIUZhntW6Lk:ayREpUJTLH8+ezNPIybIUbNLk

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks