General

  • Target

    fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16

  • Size

    651KB

  • Sample

    241106-y7cnnsxgln

  • MD5

    71fb0d37a4870325722c6eee670cadd9

  • SHA1

    ba60ff1aa001da1a6e04a6129b3cde4643a0d860

  • SHA256

    fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16

  • SHA512

    dd04eefede1a157ca28c432161ee3e3462630e00dbe52c1628852fa1be48ab6603d9b46c92e2b8f699e3a527c1ddbec8e7980a92af7f3a67bc2017b9984bbc03

  • SSDEEP

    12288:+Mr+y904G8ak+cy2IHy6F7CY91hPoFu383+pgGUq/r8CQE36Kv:gyhG8alWIppPmTGRbQy6G

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16

    • Size

      651KB

    • MD5

      71fb0d37a4870325722c6eee670cadd9

    • SHA1

      ba60ff1aa001da1a6e04a6129b3cde4643a0d860

    • SHA256

      fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16

    • SHA512

      dd04eefede1a157ca28c432161ee3e3462630e00dbe52c1628852fa1be48ab6603d9b46c92e2b8f699e3a527c1ddbec8e7980a92af7f3a67bc2017b9984bbc03

    • SSDEEP

      12288:+Mr+y904G8ak+cy2IHy6F7CY91hPoFu383+pgGUq/r8CQE36Kv:gyhG8alWIppPmTGRbQy6G

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks