General

  • Target

    5b18a2e3b00dd1fba744e01270cab041d898f9b808082cfd7b8b7df2cb3b43ff

  • Size

    651KB

  • Sample

    241106-wryj4axmcj

  • MD5

    166e6d804edabcae7350d581aaf2ca64

  • SHA1

    61a34c2a3a67ade50e83154147d1b3039ecc26d8

  • SHA256

    5b18a2e3b00dd1fba744e01270cab041d898f9b808082cfd7b8b7df2cb3b43ff

  • SHA512

    64967910fdadef4dc5934e5f9d775dcac9c661cc2dd380129efbdb172c4665012af309d5f0ac66f0a0b8ead903c5668dbe6d0fa9c9bc0a30794e1e7963f7c2ee

  • SSDEEP

    12288:HMrYy90IDDNt2zMqu4YBF+0+7tb7qZmbZBlP1PIk+5zdmc:/yRDNtLfBF+0+RQmNN7+5Rv

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      5b18a2e3b00dd1fba744e01270cab041d898f9b808082cfd7b8b7df2cb3b43ff

    • Size

      651KB

    • MD5

      166e6d804edabcae7350d581aaf2ca64

    • SHA1

      61a34c2a3a67ade50e83154147d1b3039ecc26d8

    • SHA256

      5b18a2e3b00dd1fba744e01270cab041d898f9b808082cfd7b8b7df2cb3b43ff

    • SHA512

      64967910fdadef4dc5934e5f9d775dcac9c661cc2dd380129efbdb172c4665012af309d5f0ac66f0a0b8ead903c5668dbe6d0fa9c9bc0a30794e1e7963f7c2ee

    • SSDEEP

      12288:HMrYy90IDDNt2zMqu4YBF+0+7tb7qZmbZBlP1PIk+5zdmc:/yRDNtLfBF+0+RQmNN7+5Rv

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks