General

  • Target

    f139735abe22b63eb8818a6da1a81593f2c5cb6f59def6c09c455f51e44b5e93

  • Size

    802KB

  • Sample

    241106-lywnzaxldv

  • MD5

    865e09448e9d938ee3d3e7ac87652085

  • SHA1

    28266a25e6b3e6412e270140ac05803cbd723f78

  • SHA256

    f139735abe22b63eb8818a6da1a81593f2c5cb6f59def6c09c455f51e44b5e93

  • SHA512

    d456a6c2c02c3817b3a471de7da8645c71764e37d407ff1c76157734cd2d257bbccb6337039b393d40d1da7689f16f5d4d452944c349d8d4237493ff3b97cc59

  • SSDEEP

    24576:pyI9uGFD5P1EUWrchUZijBHsf2lZ+fq79Kh:cNCtP1ujAjBWly

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      f139735abe22b63eb8818a6da1a81593f2c5cb6f59def6c09c455f51e44b5e93

    • Size

      802KB

    • MD5

      865e09448e9d938ee3d3e7ac87652085

    • SHA1

      28266a25e6b3e6412e270140ac05803cbd723f78

    • SHA256

      f139735abe22b63eb8818a6da1a81593f2c5cb6f59def6c09c455f51e44b5e93

    • SHA512

      d456a6c2c02c3817b3a471de7da8645c71764e37d407ff1c76157734cd2d257bbccb6337039b393d40d1da7689f16f5d4d452944c349d8d4237493ff3b97cc59

    • SSDEEP

      24576:pyI9uGFD5P1EUWrchUZijBHsf2lZ+fq79Kh:cNCtP1ujAjBWly

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks