General

  • Target

    4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6

  • Size

    801KB

  • Sample

    241105-yslyssybnp

  • MD5

    d3d89b6706b2e4245a788c29edc34228

  • SHA1

    9ca2fc0f91e6dc4d1478bae007b9d376a732fe49

  • SHA256

    4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6

  • SHA512

    25f03b754932e0e052c52188244c4626ea4d331b6a6a975bc5bfb84714b28450e037c830fa4cd56ff7597d3d37c2ae7e89724484ac3daa577b4f511eb2b4ebcf

  • SSDEEP

    24576:ZyJSps3fuX/8KT2X/glcD1ECQHC50jBZdf2V+v5Wln93jMYx:MJ6sK/jT2vGcD1xRCjBbfIZM

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6

    • Size

      801KB

    • MD5

      d3d89b6706b2e4245a788c29edc34228

    • SHA1

      9ca2fc0f91e6dc4d1478bae007b9d376a732fe49

    • SHA256

      4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6

    • SHA512

      25f03b754932e0e052c52188244c4626ea4d331b6a6a975bc5bfb84714b28450e037c830fa4cd56ff7597d3d37c2ae7e89724484ac3daa577b4f511eb2b4ebcf

    • SSDEEP

      24576:ZyJSps3fuX/8KT2X/glcD1ECQHC50jBZdf2V+v5Wln93jMYx:MJ6sK/jT2vGcD1xRCjBbfIZM

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks