General

  • Target

    4399da399e0647c6b02eab4ef4e5a22a4941a912afaa3ef1616c2411c8645777

  • Size

    655KB

  • Sample

    241105-qg7r5atqdj

  • MD5

    64288c09c9ec9cbaeda4ceec88c4800d

  • SHA1

    8a5d7b96be7e3a092a1430b68b23d8c8e4cfa3e5

  • SHA256

    4399da399e0647c6b02eab4ef4e5a22a4941a912afaa3ef1616c2411c8645777

  • SHA512

    905e1e63c342af5a73613b9b2b2f869f7f54f76431f2284a67df8e432b3e01b6928ad851dd21cd889562b4c5b683ade2f195903926875699174bf6de06da94da

  • SSDEEP

    12288:PMrfy90xt+lCjMMxSn+8Et44nhIZSmqSzOo/NPyv52sDfhAvOluR7pVX:4yy0iVAn+r/nhIZUS1PyV9Av1RvX

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      4399da399e0647c6b02eab4ef4e5a22a4941a912afaa3ef1616c2411c8645777

    • Size

      655KB

    • MD5

      64288c09c9ec9cbaeda4ceec88c4800d

    • SHA1

      8a5d7b96be7e3a092a1430b68b23d8c8e4cfa3e5

    • SHA256

      4399da399e0647c6b02eab4ef4e5a22a4941a912afaa3ef1616c2411c8645777

    • SHA512

      905e1e63c342af5a73613b9b2b2f869f7f54f76431f2284a67df8e432b3e01b6928ad851dd21cd889562b4c5b683ade2f195903926875699174bf6de06da94da

    • SSDEEP

      12288:PMrfy90xt+lCjMMxSn+8Et44nhIZSmqSzOo/NPyv52sDfhAvOluR7pVX:4yy0iVAn+r/nhIZUS1PyV9Av1RvX

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks