General

  • Target

    1f3d59b5c61f98cb42c595f7d0c808a6fd112e1123621c57ca145b10db33a51c

  • Size

    685KB

  • Sample

    241105-htt3sswhmg

  • MD5

    588251c4de051f535001474d81a57c08

  • SHA1

    8d6b0932b326986cd8f24618c946f7a88b522fd3

  • SHA256

    1f3d59b5c61f98cb42c595f7d0c808a6fd112e1123621c57ca145b10db33a51c

  • SHA512

    687b318f844350cd97665f64f36d1b6eea1b9ce626a3c0dd669d9754db356041600a0ecca4c3e92555a168a13e82da2f63de05367b0edea3325d2f1d74ecb85e

  • SSDEEP

    12288:jMrcy905H7cvI38sx4IEQomJ0Ft32g9cSN31urSBPAewx4TxJifKK:ny4Ivkl+QomJk12jKorMa

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      1f3d59b5c61f98cb42c595f7d0c808a6fd112e1123621c57ca145b10db33a51c

    • Size

      685KB

    • MD5

      588251c4de051f535001474d81a57c08

    • SHA1

      8d6b0932b326986cd8f24618c946f7a88b522fd3

    • SHA256

      1f3d59b5c61f98cb42c595f7d0c808a6fd112e1123621c57ca145b10db33a51c

    • SHA512

      687b318f844350cd97665f64f36d1b6eea1b9ce626a3c0dd669d9754db356041600a0ecca4c3e92555a168a13e82da2f63de05367b0edea3325d2f1d74ecb85e

    • SSDEEP

      12288:jMrcy905H7cvI38sx4IEQomJ0Ft32g9cSN31urSBPAewx4TxJifKK:ny4Ivkl+QomJk12jKorMa

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks