General

  • Target

    8d96b1118a3f5b3a82dbb64465820ab33f9c436696c623a3ccf5675f524c8dd1

  • Size

    660KB

  • Sample

    241105-q4wcls1pew

  • MD5

    10f5efd27cd534e78bce802f9bc66d2f

  • SHA1

    cfefc288c6a3264921c5557157331e566ee1e877

  • SHA256

    8d96b1118a3f5b3a82dbb64465820ab33f9c436696c623a3ccf5675f524c8dd1

  • SHA512

    b758d00a0324f1448e18ae0e304027a6af476c2a1b210daab09c158509c0d20c2ba745c67f97b773155b264f7baf6bd20dbbeca6238658f66e7fbb71f9c8986e

  • SSDEEP

    12288:LMrmy90ctFh/8kO0yZLjBfuBy4YYzZ2EFSzcoDUSK3/5F4aa:VyrFA0yZLjBAPd2EFElvKri

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      8d96b1118a3f5b3a82dbb64465820ab33f9c436696c623a3ccf5675f524c8dd1

    • Size

      660KB

    • MD5

      10f5efd27cd534e78bce802f9bc66d2f

    • SHA1

      cfefc288c6a3264921c5557157331e566ee1e877

    • SHA256

      8d96b1118a3f5b3a82dbb64465820ab33f9c436696c623a3ccf5675f524c8dd1

    • SHA512

      b758d00a0324f1448e18ae0e304027a6af476c2a1b210daab09c158509c0d20c2ba745c67f97b773155b264f7baf6bd20dbbeca6238658f66e7fbb71f9c8986e

    • SSDEEP

      12288:LMrmy90ctFh/8kO0yZLjBfuBy4YYzZ2EFSzcoDUSK3/5F4aa:VyrFA0yZLjBAPd2EFElvKri

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks