General

  • Target

    f1d0e06bf9d4a692e9be4b262b8136f910d2f38369e36d0eb60046620d3aa26c

  • Size

    787KB

  • Sample

    241106-mjt29s1khp

  • MD5

    cff3108c15dff71be7cd6c7528d2eaba

  • SHA1

    431cfe02fcdf9acc9431528fe6daaf96044a336f

  • SHA256

    f1d0e06bf9d4a692e9be4b262b8136f910d2f38369e36d0eb60046620d3aa26c

  • SHA512

    f84ddcc9b15463da2e4885615a4862376a4d208d3447b464e86403e8333d3ab344e248cd216a2ea07fcb63796338118d99047635c61c81ef5579ec2e095ad10e

  • SSDEEP

    12288:jMrSy90IlqxJ4ubs5SfUJ0LkLHNc5zvyTI773kU1udX8coG0U63kz:VyWZbs5mUJIkJc5zqTE73k4HcoGD6Uz

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      f1d0e06bf9d4a692e9be4b262b8136f910d2f38369e36d0eb60046620d3aa26c

    • Size

      787KB

    • MD5

      cff3108c15dff71be7cd6c7528d2eaba

    • SHA1

      431cfe02fcdf9acc9431528fe6daaf96044a336f

    • SHA256

      f1d0e06bf9d4a692e9be4b262b8136f910d2f38369e36d0eb60046620d3aa26c

    • SHA512

      f84ddcc9b15463da2e4885615a4862376a4d208d3447b464e86403e8333d3ab344e248cd216a2ea07fcb63796338118d99047635c61c81ef5579ec2e095ad10e

    • SSDEEP

      12288:jMrSy90IlqxJ4ubs5SfUJ0LkLHNc5zvyTI773kU1udX8coG0U63kz:VyWZbs5mUJIkJc5zqTE73k4HcoGD6Uz

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks