General

  • Target

    df4e8d2b32b5d0cbde74401e78295ed5809e449b731525f2bc170b486c472d8d

  • Size

    651KB

  • Sample

    241106-mbg3qsyfpq

  • MD5

    ab8941c4f580acc9a78e8f5fdd855d69

  • SHA1

    ffb5025912e65bcc89337abeb690721c50fdb124

  • SHA256

    df4e8d2b32b5d0cbde74401e78295ed5809e449b731525f2bc170b486c472d8d

  • SHA512

    8156040934fb6620408abe0344dfd509b4593bfd59658497f7f767267887c29c23866f135331b11f411c685528eff191cdc35321df81ff909158fa96a5ec0f37

  • SSDEEP

    12288:DMrzy90OPEqQFxCsV0S0u9yKXSzSn3qUo/wKnu5dx0+vO:0yrEHb/Vh0u9yKXSWn3qX9u5dxj2

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      df4e8d2b32b5d0cbde74401e78295ed5809e449b731525f2bc170b486c472d8d

    • Size

      651KB

    • MD5

      ab8941c4f580acc9a78e8f5fdd855d69

    • SHA1

      ffb5025912e65bcc89337abeb690721c50fdb124

    • SHA256

      df4e8d2b32b5d0cbde74401e78295ed5809e449b731525f2bc170b486c472d8d

    • SHA512

      8156040934fb6620408abe0344dfd509b4593bfd59658497f7f767267887c29c23866f135331b11f411c685528eff191cdc35321df81ff909158fa96a5ec0f37

    • SSDEEP

      12288:DMrzy90OPEqQFxCsV0S0u9yKXSzSn3qUo/wKnu5dx0+vO:0yrEHb/Vh0u9yKXSWn3qX9u5dxj2

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks