General

  • Target

    5256b2a808feb6033fc5500cd82ec0030e65d73313cbea4200e52f76aa4d0d72

  • Size

    814KB

  • Sample

    241105-yxltlayclp

  • MD5

    b9260cd634b836be8132690e717a96bf

  • SHA1

    7d324fd1c77ca2287a59ff487c26d6c6104cfe7c

  • SHA256

    5256b2a808feb6033fc5500cd82ec0030e65d73313cbea4200e52f76aa4d0d72

  • SHA512

    d3bc855f3537c89215f32812bc0d628cf1c2f0853b2dfe3b1fe4219a97bebd6e3fe21beb24f5adaaff3c84b3ef7f5aff0759654aa4c1f554465fe75300acff6c

  • SSDEEP

    12288:kMrWy90ybW0g36u2zo4GNZ2KAvewBItus5Ehhcz5NNIAwxylDQ2NQxlCFdaxKZQF:iy54KA0ZIprMkDzMudaEZO

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      5256b2a808feb6033fc5500cd82ec0030e65d73313cbea4200e52f76aa4d0d72

    • Size

      814KB

    • MD5

      b9260cd634b836be8132690e717a96bf

    • SHA1

      7d324fd1c77ca2287a59ff487c26d6c6104cfe7c

    • SHA256

      5256b2a808feb6033fc5500cd82ec0030e65d73313cbea4200e52f76aa4d0d72

    • SHA512

      d3bc855f3537c89215f32812bc0d628cf1c2f0853b2dfe3b1fe4219a97bebd6e3fe21beb24f5adaaff3c84b3ef7f5aff0759654aa4c1f554465fe75300acff6c

    • SSDEEP

      12288:kMrWy90ybW0g36u2zo4GNZ2KAvewBItus5Ehhcz5NNIAwxylDQ2NQxlCFdaxKZQF:iy54KA0ZIprMkDzMudaEZO

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks