General

  • Target

    3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c

  • Size

    787KB

  • Sample

    241107-dh59gavbjm

  • MD5

    9a13540d36180f50b7a23c3b8d66f606

  • SHA1

    6083211ce853187f8fed2c13184f6da93cc70f11

  • SHA256

    3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c

  • SHA512

    354d8f11971ae5d065d98fb35fbfaba5d6db066015fc6e72571eb0f658b9a7b893e690aa0b77e3f1d6b954cd7aefb9258dcfd494161a89311f18d3d1f44267f3

  • SSDEEP

    12288:fMrcy90Olt35SAxSFiFaH33lXJSKS177ZHteoPUv3rv14d+j5bil:jypSAxSFTXVXJ27eocv3rt55ul

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c

    • Size

      787KB

    • MD5

      9a13540d36180f50b7a23c3b8d66f606

    • SHA1

      6083211ce853187f8fed2c13184f6da93cc70f11

    • SHA256

      3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c

    • SHA512

      354d8f11971ae5d065d98fb35fbfaba5d6db066015fc6e72571eb0f658b9a7b893e690aa0b77e3f1d6b954cd7aefb9258dcfd494161a89311f18d3d1f44267f3

    • SSDEEP

      12288:fMrcy90Olt35SAxSFiFaH33lXJSKS177ZHteoPUv3rv14d+j5bil:jypSAxSFTXVXJ27eocv3rt55ul

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks