General

  • Target

    ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e

  • Size

    652KB

  • Sample

    241106-v77bhavfmp

  • MD5

    e3ddc289a9def0882a4c7bb11ce64f96

  • SHA1

    87a13420dddb9a39f8ac9e463b94a286a35d9a68

  • SHA256

    ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e

  • SHA512

    657c3975c6443f01b5e328a76eff25c4c4af198d5ed8346dfd9f14ed05398c8be2cc512dad78f67d03e32e812a437add2f1785ea6ac8c2664f82b54a5dd65dd3

  • SSDEEP

    12288:4MrDy905jVwnTjjnbgoBTcZSidrrrP2uAVXCxrxEzb:byaVoPTgPTfxG

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e

    • Size

      652KB

    • MD5

      e3ddc289a9def0882a4c7bb11ce64f96

    • SHA1

      87a13420dddb9a39f8ac9e463b94a286a35d9a68

    • SHA256

      ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e

    • SHA512

      657c3975c6443f01b5e328a76eff25c4c4af198d5ed8346dfd9f14ed05398c8be2cc512dad78f67d03e32e812a437add2f1785ea6ac8c2664f82b54a5dd65dd3

    • SSDEEP

      12288:4MrDy905jVwnTjjnbgoBTcZSidrrrP2uAVXCxrxEzb:byaVoPTgPTfxG

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks