General

  • Target

    a783af0f8ed4a5103ffa37c9f97149ed39eb35fff55e9e90bb0e3cfebf591fe9

  • Size

    653KB

  • Sample

    241106-txde1atglj

  • MD5

    3abe48a521319c7231df8c1dc6df8059

  • SHA1

    e58401cb323447b13b9b285ac3933ac79a10f6d6

  • SHA256

    a783af0f8ed4a5103ffa37c9f97149ed39eb35fff55e9e90bb0e3cfebf591fe9

  • SHA512

    005d19641a171dd6c87f7d302a0f18d6b8ecbb8fb1cef358703723705e124d685c4b9c1a46296a43ab08156aceb459bd2499e9519af1b6d4bb920c3d53a75e6f

  • SSDEEP

    12288:aMr/y90FxWrRm7Y/xx8KKgofTb6TihrrcPknhVpNZV5I1n:lynr+0L8KKNGPgL6t

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      a783af0f8ed4a5103ffa37c9f97149ed39eb35fff55e9e90bb0e3cfebf591fe9

    • Size

      653KB

    • MD5

      3abe48a521319c7231df8c1dc6df8059

    • SHA1

      e58401cb323447b13b9b285ac3933ac79a10f6d6

    • SHA256

      a783af0f8ed4a5103ffa37c9f97149ed39eb35fff55e9e90bb0e3cfebf591fe9

    • SHA512

      005d19641a171dd6c87f7d302a0f18d6b8ecbb8fb1cef358703723705e124d685c4b9c1a46296a43ab08156aceb459bd2499e9519af1b6d4bb920c3d53a75e6f

    • SSDEEP

      12288:aMr/y90FxWrRm7Y/xx8KKgofTb6TihrrcPknhVpNZV5I1n:lynr+0L8KKNGPgL6t

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks