General

  • Target

    f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066

  • Size

    685KB

  • Sample

    241106-rwva1strbj

  • MD5

    1c6709a5f679baf28220133ad8a1b0e7

  • SHA1

    9d6abcc6f0f0868bcaeeafce1c33dca4c5286344

  • SHA256

    f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066

  • SHA512

    233145fd4a68f571eccbc4b30724410b22b7bc3b95883a0ef861e2fd823250a84c3f1a742084ba4865509447003977538f7b2e7b9f197b5ceda75726f47413c8

  • SSDEEP

    12288:4Mr4y90BGIZ/rGnBCVXyY72JnRSxj6FrSuIRMlYm3q1BC5:Ay8GVCVXy02veWwRMXj

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066

    • Size

      685KB

    • MD5

      1c6709a5f679baf28220133ad8a1b0e7

    • SHA1

      9d6abcc6f0f0868bcaeeafce1c33dca4c5286344

    • SHA256

      f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066

    • SHA512

      233145fd4a68f571eccbc4b30724410b22b7bc3b95883a0ef861e2fd823250a84c3f1a742084ba4865509447003977538f7b2e7b9f197b5ceda75726f47413c8

    • SSDEEP

      12288:4Mr4y90BGIZ/rGnBCVXyY72JnRSxj6FrSuIRMlYm3q1BC5:Ay8GVCVXy02veWwRMXj

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks