General

  • Target

    3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d

  • Size

    653KB

  • Sample

    241106-psafbsyrgt

  • MD5

    5f27bfb816e2ec3eeccd1e6ec7c1b612

  • SHA1

    18233da4d305d1473d0345456c3008cdc8a4e6c0

  • SHA256

    3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d

  • SHA512

    617c7be96330f909481c2523a4dc13555076748a2e0e7f8250b6c0e2ae5d2155c7b7330fa52c7e76a4ed41affd53df30b545f3fadd213fb9096463c689636825

  • SSDEEP

    12288:MMrdy90myZprljU1kCER9nUpp1yc+Sb7B47FpmjZ3luzPxniz0:RyM1M1yc+SbujmlOPxd

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d

    • Size

      653KB

    • MD5

      5f27bfb816e2ec3eeccd1e6ec7c1b612

    • SHA1

      18233da4d305d1473d0345456c3008cdc8a4e6c0

    • SHA256

      3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d

    • SHA512

      617c7be96330f909481c2523a4dc13555076748a2e0e7f8250b6c0e2ae5d2155c7b7330fa52c7e76a4ed41affd53df30b545f3fadd213fb9096463c689636825

    • SSDEEP

      12288:MMrdy90myZprljU1kCER9nUpp1yc+Sb7B47FpmjZ3luzPxniz0:RyM1M1yc+SbujmlOPxd

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks