General

  • Target

    22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498

  • Size

    815KB

  • Sample

    241106-mde16ayfrp

  • MD5

    5603b697a87c60e7771e73e48eeaa436

  • SHA1

    2059a3edc598f3d25e67076c4a6e7e1c66c5bc89

  • SHA256

    22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498

  • SHA512

    4b6d2c76822822147f0c7614b8df61f461571c712376e3855e56060b17e87dfc155460cb1216abb887f9af28a89b3c7f02b2595f279ee7e78b14daf02aab265e

  • SSDEEP

    24576:Ryf4rh9+1urXPMcbaboTv12HEW0Q/z34R2:Ef4FXPMcmCN4TQ

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498

    • Size

      815KB

    • MD5

      5603b697a87c60e7771e73e48eeaa436

    • SHA1

      2059a3edc598f3d25e67076c4a6e7e1c66c5bc89

    • SHA256

      22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498

    • SHA512

      4b6d2c76822822147f0c7614b8df61f461571c712376e3855e56060b17e87dfc155460cb1216abb887f9af28a89b3c7f02b2595f279ee7e78b14daf02aab265e

    • SSDEEP

      24576:Ryf4rh9+1urXPMcbaboTv12HEW0Q/z34R2:Ef4FXPMcmCN4TQ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks