General

  • Target

    e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6

  • Size

    801KB

  • Sample

    241107-g1qtaaxcjb

  • MD5

    f3e52107bf5f01d292eec7d54a3968c7

  • SHA1

    121572755e63cbf764da14ccf4bcbe7342a814e2

  • SHA256

    e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6

  • SHA512

    596edaeff331d8323e7da0d77cdab2c6de5369b9c022feebb70dcd78433a806c3424ebe9ca0a6f31cfebc4242682d5a367560321ba11ff5cfe95f8779c6c7df7

  • SSDEEP

    24576:UylhTtvXQ1EJbbfBohiZLjB7Pf2IB2Gd/gJ9392JUKRu:jlh5vXQ1wtFjB7E7N6UKR

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6

    • Size

      801KB

    • MD5

      f3e52107bf5f01d292eec7d54a3968c7

    • SHA1

      121572755e63cbf764da14ccf4bcbe7342a814e2

    • SHA256

      e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6

    • SHA512

      596edaeff331d8323e7da0d77cdab2c6de5369b9c022feebb70dcd78433a806c3424ebe9ca0a6f31cfebc4242682d5a367560321ba11ff5cfe95f8779c6c7df7

    • SSDEEP

      24576:UylhTtvXQ1EJbbfBohiZLjB7Pf2IB2Gd/gJ9392JUKRu:jlh5vXQ1wtFjB7E7N6UKR

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks