General

  • Target

    33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715

  • Size

    802KB

  • Sample

    241105-r59gassle1

  • MD5

    b6ceea80e049fda34b4a89c06bf0b011

  • SHA1

    33461e05751d49bbe7005b95c2636d49dc7f0845

  • SHA256

    33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715

  • SHA512

    1aa0758fe4006be6eb4a1b19a36b23c8e50f220d1bc7b52f23b0e95c2e886b504d5f674c29713712d2cd220d05c4fde36ffc723df482218126fb1ba84533f4cf

  • SSDEEP

    24576:GyaYSlpWp2pig21ECN6Z4jBcBf2Yx/PO9m+s:VeXWpa21myjBI1Pd

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715

    • Size

      802KB

    • MD5

      b6ceea80e049fda34b4a89c06bf0b011

    • SHA1

      33461e05751d49bbe7005b95c2636d49dc7f0845

    • SHA256

      33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715

    • SHA512

      1aa0758fe4006be6eb4a1b19a36b23c8e50f220d1bc7b52f23b0e95c2e886b504d5f674c29713712d2cd220d05c4fde36ffc723df482218126fb1ba84533f4cf

    • SSDEEP

      24576:GyaYSlpWp2pig21ECN6Z4jBcBf2Yx/PO9m+s:VeXWpa21myjBI1Pd

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks