General

  • Target

    6198d935ea4941d1b6ffa7be989855d19d6915bc956be9b0367605cf759374df

  • Size

    660KB

  • Sample

    241105-lfmckszapk

  • MD5

    d853d3a8f340db5314269377b1570033

  • SHA1

    0f092191fd93033d9081b3ec767052baedadae82

  • SHA256

    6198d935ea4941d1b6ffa7be989855d19d6915bc956be9b0367605cf759374df

  • SHA512

    3b20899e8b8910589ea1a69e1c547652d6dbcfcfbe84d10de495ad6ef59560ca324b29dda5cc17a0c54514584981aa0c0e77b5a6c468106ea84c5e62a84a4b77

  • SSDEEP

    12288:OMrqy90Fy5IxjWom7oYFM0NZdjBfsMynbYzo2UNSzc/GzrLM0ZE6TSistm:gynvkYu0NZdjB4Es2UNEzro/6TYE

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      6198d935ea4941d1b6ffa7be989855d19d6915bc956be9b0367605cf759374df

    • Size

      660KB

    • MD5

      d853d3a8f340db5314269377b1570033

    • SHA1

      0f092191fd93033d9081b3ec767052baedadae82

    • SHA256

      6198d935ea4941d1b6ffa7be989855d19d6915bc956be9b0367605cf759374df

    • SHA512

      3b20899e8b8910589ea1a69e1c547652d6dbcfcfbe84d10de495ad6ef59560ca324b29dda5cc17a0c54514584981aa0c0e77b5a6c468106ea84c5e62a84a4b77

    • SSDEEP

      12288:OMrqy90Fy5IxjWom7oYFM0NZdjBfsMynbYzo2UNSzc/GzrLM0ZE6TSistm:gynvkYu0NZdjB4Es2UNEzro/6TYE

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks