General

  • Target

    0dd80090b35683b12e16e7baaac9633d02a09c9431b963ccff94a05a34b20991

  • Size

    655KB

  • Sample

    241105-kqrvda1jdn

  • MD5

    ff4ffefdb8c1a43c7814cef403b66b2c

  • SHA1

    0b804bebf3e56c353c8e0a4b74bc05c4c93e333e

  • SHA256

    0dd80090b35683b12e16e7baaac9633d02a09c9431b963ccff94a05a34b20991

  • SHA512

    8fa10218dc3ab0f76cc9786cbe7f35e14a9b5e5f167bc24e03b46aa48bbdfad7d79c28494bb9582d5b1f80f3b2029e59a070360ab7bcd1a16e3a8481b7fac288

  • SSDEEP

    12288:8MrXy90vhGuVbOo3o0rJwTZF9m6EPS4IvyhV9BEmdI:ryluVb33oSqJOK4IKhV96/

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      0dd80090b35683b12e16e7baaac9633d02a09c9431b963ccff94a05a34b20991

    • Size

      655KB

    • MD5

      ff4ffefdb8c1a43c7814cef403b66b2c

    • SHA1

      0b804bebf3e56c353c8e0a4b74bc05c4c93e333e

    • SHA256

      0dd80090b35683b12e16e7baaac9633d02a09c9431b963ccff94a05a34b20991

    • SHA512

      8fa10218dc3ab0f76cc9786cbe7f35e14a9b5e5f167bc24e03b46aa48bbdfad7d79c28494bb9582d5b1f80f3b2029e59a070360ab7bcd1a16e3a8481b7fac288

    • SSDEEP

      12288:8MrXy90vhGuVbOo3o0rJwTZF9m6EPS4IvyhV9BEmdI:ryluVb33oSqJOK4IKhV96/

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks