General

  • Target

    d5ccf3c077732030d59468393edcb3b7eab9e171752daaf802cbb2dd8f79384b

  • Size

    650KB

  • Sample

    241106-xf12hsvhqa

  • MD5

    d49dedc7557d534b8d55c661151180df

  • SHA1

    9ac460463a1e10bcb37364d27456dbe601587b7b

  • SHA256

    d5ccf3c077732030d59468393edcb3b7eab9e171752daaf802cbb2dd8f79384b

  • SHA512

    6c88a2bf97e4380613ea6026efbce987ad18d46925d8a6e1425fb5f33430e0150451a37cb6eba173e0fb787f47440dd3f9c01a5b5b4dd45e63fcd2ea5c1e4a8e

  • SSDEEP

    12288:KMrVy90W6Zb8Puu0z31qHu9sKGszX33xUltwRcuV8PtjQqD7V2:3yH6ZoJxHu9sKGsT33xshuV8PiqD7V2

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      d5ccf3c077732030d59468393edcb3b7eab9e171752daaf802cbb2dd8f79384b

    • Size

      650KB

    • MD5

      d49dedc7557d534b8d55c661151180df

    • SHA1

      9ac460463a1e10bcb37364d27456dbe601587b7b

    • SHA256

      d5ccf3c077732030d59468393edcb3b7eab9e171752daaf802cbb2dd8f79384b

    • SHA512

      6c88a2bf97e4380613ea6026efbce987ad18d46925d8a6e1425fb5f33430e0150451a37cb6eba173e0fb787f47440dd3f9c01a5b5b4dd45e63fcd2ea5c1e4a8e

    • SSDEEP

      12288:KMrVy90W6Zb8Puu0z31qHu9sKGszX33xUltwRcuV8PtjQqD7V2:3yH6ZoJxHu9sKGsT33xshuV8PiqD7V2

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks