General

  • Target

    192dc913c7e21636e64c90c8cc96dbd6d9b0cc04727ec24903838bfb6c8d1731

  • Size

    651KB

  • Sample

    241105-n9mxbatjdr

  • MD5

    0eefb802b56e2d5fcaeef977d34ff964

  • SHA1

    28b9d85cee907fb7c25427db7cfea0196b56cb28

  • SHA256

    192dc913c7e21636e64c90c8cc96dbd6d9b0cc04727ec24903838bfb6c8d1731

  • SHA512

    4690961674c10ae710459d4f7c8e69d17444a0a8b3449b19935c68da16f4f3158f3fc8956f4c1252b4ee4a2aea8752be27000bbf92698ee7cf954783eae758f6

  • SSDEEP

    12288:xMray90NUATsjTR+y+tq7Ih7XGmhZ6lFz9EdnuCd:3yL5jTR+y+tqKamDlnf

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      192dc913c7e21636e64c90c8cc96dbd6d9b0cc04727ec24903838bfb6c8d1731

    • Size

      651KB

    • MD5

      0eefb802b56e2d5fcaeef977d34ff964

    • SHA1

      28b9d85cee907fb7c25427db7cfea0196b56cb28

    • SHA256

      192dc913c7e21636e64c90c8cc96dbd6d9b0cc04727ec24903838bfb6c8d1731

    • SHA512

      4690961674c10ae710459d4f7c8e69d17444a0a8b3449b19935c68da16f4f3158f3fc8956f4c1252b4ee4a2aea8752be27000bbf92698ee7cf954783eae758f6

    • SSDEEP

      12288:xMray90NUATsjTR+y+tq7Ih7XGmhZ6lFz9EdnuCd:3yL5jTR+y+tqKamDlnf

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks