General

  • Target

    39a542622e37a62708ed8c12ecd97a0931b75d73ee1f89a60008d4d81c8fb971

  • Size

    789KB

  • Sample

    241105-r74c3ashjg

  • MD5

    9bc0784541f3445b3988c6662d94d051

  • SHA1

    de586db06e7a695b2317aefb008478ae03e48553

  • SHA256

    39a542622e37a62708ed8c12ecd97a0931b75d73ee1f89a60008d4d81c8fb971

  • SHA512

    69718423a0e540ead4c526968fa669353245fb6bb208bedf7b97381f67ded926040aed743e2df51314b67f08873603cdd482c6bd7f5d5f4aec6775212cd88577

  • SSDEEP

    12288:KMrcy90xHWJSgWiFWGH/wIQqiHFxzfB4Wi4moBo7D1mxZlaOOeZVN:Sy+W/WXGDQqiHF1fB4Wi4mZ1mzlaOOC

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      39a542622e37a62708ed8c12ecd97a0931b75d73ee1f89a60008d4d81c8fb971

    • Size

      789KB

    • MD5

      9bc0784541f3445b3988c6662d94d051

    • SHA1

      de586db06e7a695b2317aefb008478ae03e48553

    • SHA256

      39a542622e37a62708ed8c12ecd97a0931b75d73ee1f89a60008d4d81c8fb971

    • SHA512

      69718423a0e540ead4c526968fa669353245fb6bb208bedf7b97381f67ded926040aed743e2df51314b67f08873603cdd482c6bd7f5d5f4aec6775212cd88577

    • SSDEEP

      12288:KMrcy90xHWJSgWiFWGH/wIQqiHFxzfB4Wi4moBo7D1mxZlaOOeZVN:Sy+W/WXGDQqiHF1fB4Wi4mZ1mzlaOOC

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks