General

  • Target

    017671dcac1cac669ed6f943cbc3b2ee147bb045c047e703fbfbfef298f01b13

  • Size

    651KB

  • Sample

    241105-pmzg9ssakr

  • MD5

    a8530fd087d5a258751fb49f2deaaf4e

  • SHA1

    646eb43c1555db33d48adf67b52054b90518e40e

  • SHA256

    017671dcac1cac669ed6f943cbc3b2ee147bb045c047e703fbfbfef298f01b13

  • SHA512

    80756f1f073a758addd0299a7f12729feed2430265e274e4db59cde4bc038be7c1abd4e1995a70b95a2d662c0e9f995a2decb10b307e0156e30e0d62d67fae35

  • SSDEEP

    12288:IMr7y90d+REC0v7TenRWJptEmbQZO83npgGtqGr8Xf5vr:jyrRzM7TKcJrEp6GBif5j

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      017671dcac1cac669ed6f943cbc3b2ee147bb045c047e703fbfbfef298f01b13

    • Size

      651KB

    • MD5

      a8530fd087d5a258751fb49f2deaaf4e

    • SHA1

      646eb43c1555db33d48adf67b52054b90518e40e

    • SHA256

      017671dcac1cac669ed6f943cbc3b2ee147bb045c047e703fbfbfef298f01b13

    • SHA512

      80756f1f073a758addd0299a7f12729feed2430265e274e4db59cde4bc038be7c1abd4e1995a70b95a2d662c0e9f995a2decb10b307e0156e30e0d62d67fae35

    • SSDEEP

      12288:IMr7y90d+REC0v7TenRWJptEmbQZO83npgGtqGr8Xf5vr:jyrRzM7TKcJrEp6GBif5j

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks