General

  • Target

    065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d

  • Size

    652KB

  • Sample

    241105-n5t5tssrhm

  • MD5

    3c3cd50a82be18ae3a544f960926170a

  • SHA1

    4d1415c4a8a79545b6b3c7d08a62c0c7174ee3b1

  • SHA256

    065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d

  • SHA512

    55b07e143bd3a84ca5b20f511fa30671812f4b5fc53ac0605e8e63e3fe92a0ce2f881146f4e1c3943c772bde09b3daa4376c91564a52020c1beb524920339d09

  • SSDEEP

    12288:gMr1y90Zob+2SE1ZvXDViMxoMTrZHsikrJoPKi+V9QmjeeSi68r:lyL62Z3b7hZPp5mj7+8r

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d

    • Size

      652KB

    • MD5

      3c3cd50a82be18ae3a544f960926170a

    • SHA1

      4d1415c4a8a79545b6b3c7d08a62c0c7174ee3b1

    • SHA256

      065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d

    • SHA512

      55b07e143bd3a84ca5b20f511fa30671812f4b5fc53ac0605e8e63e3fe92a0ce2f881146f4e1c3943c772bde09b3daa4376c91564a52020c1beb524920339d09

    • SSDEEP

      12288:gMr1y90Zob+2SE1ZvXDViMxoMTrZHsikrJoPKi+V9QmjeeSi68r:lyL62Z3b7hZPp5mj7+8r

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks