General

  • Target

    cf5333e34e10da00ff35501721a80dcc7d20e87f7316c7dcb0cd26edf6b9c960

  • Size

    815KB

  • Sample

    241106-yxafkaxemr

  • MD5

    fc0f41d1444b9a18e38b96efc57b8400

  • SHA1

    859cdac635fd8246ae0299313cb1cc3d54790036

  • SHA256

    cf5333e34e10da00ff35501721a80dcc7d20e87f7316c7dcb0cd26edf6b9c960

  • SHA512

    b23c974a25569da4a3402c76ff9a1b414fd44b16ab5c66c61c37a885e474abe15e4e3a68bc05b725355e500ab263699c8fcff4f01d4411d595f8181dbd5ed372

  • SSDEEP

    12288:zMrwy90+KBfUL3L26nGR/mjdE7sEeu88CAinE2eqASPuXIrSahIn7Iq3ZK:zy7rT7G9mjdoCy2mcpP6MuZK

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      cf5333e34e10da00ff35501721a80dcc7d20e87f7316c7dcb0cd26edf6b9c960

    • Size

      815KB

    • MD5

      fc0f41d1444b9a18e38b96efc57b8400

    • SHA1

      859cdac635fd8246ae0299313cb1cc3d54790036

    • SHA256

      cf5333e34e10da00ff35501721a80dcc7d20e87f7316c7dcb0cd26edf6b9c960

    • SHA512

      b23c974a25569da4a3402c76ff9a1b414fd44b16ab5c66c61c37a885e474abe15e4e3a68bc05b725355e500ab263699c8fcff4f01d4411d595f8181dbd5ed372

    • SSDEEP

      12288:zMrwy90+KBfUL3L26nGR/mjdE7sEeu88CAinE2eqASPuXIrSahIn7Iq3ZK:zy7rT7G9mjdoCy2mcpP6MuZK

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks