General

  • Target

    d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2

  • Size

    660KB

  • Sample

    241105-zxbjas1mep

  • MD5

    b79bea7587e456f0465a048ec696d1f2

  • SHA1

    8fcb5b2c510778593c4b9cec47f8fcb44b5f6b34

  • SHA256

    d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2

  • SHA512

    2503d30701d6f19876e3d9d9e3a8c7181ede098ee384987c1bd784b584e2fd2c521afe4828aa040153dfc568c8354cad0cefb5c2bc705441afa2eef5b54eb6c4

  • SSDEEP

    12288:OMrmy90hyjtvUiBG2hErmOvNZ79jBf9bydZYzU2zKSzc6AuEQsn8oUmXW:kyWsRUi0YOFZhjBMyA2zKEGcskcW

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2

    • Size

      660KB

    • MD5

      b79bea7587e456f0465a048ec696d1f2

    • SHA1

      8fcb5b2c510778593c4b9cec47f8fcb44b5f6b34

    • SHA256

      d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2

    • SHA512

      2503d30701d6f19876e3d9d9e3a8c7181ede098ee384987c1bd784b584e2fd2c521afe4828aa040153dfc568c8354cad0cefb5c2bc705441afa2eef5b54eb6c4

    • SSDEEP

      12288:OMrmy90hyjtvUiBG2hErmOvNZ79jBf9bydZYzU2zKSzc6AuEQsn8oUmXW:kyWsRUi0YOFZhjBMyA2zKEGcskcW

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks