General

  • Target

    7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057

  • Size

    655KB

  • Sample

    241106-k45ndszlfm

  • MD5

    b3a55f06c06e42a856a1e9290abc2478

  • SHA1

    6f4f54b56f90e9f5522e698ba0dcaa3615c6b2b9

  • SHA256

    7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057

  • SHA512

    0f1524f46a7e8231eb3202bc7595b34c1e16fa896490870b6b303db898a2fb08652704a3aec6d71d1b2cc85d5f77584a7d3bbde8723e4825692e8e86b6dee26e

  • SSDEEP

    12288:2Mr/y90y9qXQ3ixHLUbmrEOcTIScDcZqMRurem:5yBSxH+XxTI7YUrL

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057

    • Size

      655KB

    • MD5

      b3a55f06c06e42a856a1e9290abc2478

    • SHA1

      6f4f54b56f90e9f5522e698ba0dcaa3615c6b2b9

    • SHA256

      7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057

    • SHA512

      0f1524f46a7e8231eb3202bc7595b34c1e16fa896490870b6b303db898a2fb08652704a3aec6d71d1b2cc85d5f77584a7d3bbde8723e4825692e8e86b6dee26e

    • SSDEEP

      12288:2Mr/y90y9qXQ3ixHLUbmrEOcTIScDcZqMRurem:5yBSxH+XxTI7YUrL

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks