General

  • Target

    0fc9e3a8efc97ca24c8cccb6aa309d597c846caf1b4fca324e6f45053c70f904

  • Size

    795KB

  • Sample

    241105-ylldpaznck

  • MD5

    9ed6075eb1d83034c8b1cde487d9f7d2

  • SHA1

    2a01db8c1e430c608beb75fc54fa1f617c8ddebc

  • SHA256

    0fc9e3a8efc97ca24c8cccb6aa309d597c846caf1b4fca324e6f45053c70f904

  • SHA512

    f80e03cb94cea8a7c2db9a79f0e5e034ccb02e85a64519ba3f6d3dff1e915e4c908d97a0d54e86da510dc915d9e9f6f9fb6cfb51b7a96e466725054987f1dce8

  • SSDEEP

    24576:jyxtdc0+ahiM5WWJiVD7RfwdrC+AQwQHjzo/t3r:2xkGJ5W74dsQDzSt

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      0fc9e3a8efc97ca24c8cccb6aa309d597c846caf1b4fca324e6f45053c70f904

    • Size

      795KB

    • MD5

      9ed6075eb1d83034c8b1cde487d9f7d2

    • SHA1

      2a01db8c1e430c608beb75fc54fa1f617c8ddebc

    • SHA256

      0fc9e3a8efc97ca24c8cccb6aa309d597c846caf1b4fca324e6f45053c70f904

    • SHA512

      f80e03cb94cea8a7c2db9a79f0e5e034ccb02e85a64519ba3f6d3dff1e915e4c908d97a0d54e86da510dc915d9e9f6f9fb6cfb51b7a96e466725054987f1dce8

    • SSDEEP

      24576:jyxtdc0+ahiM5WWJiVD7RfwdrC+AQwQHjzo/t3r:2xkGJ5W74dsQDzSt

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks