General

  • Target

    92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65

  • Size

    686KB

  • Sample

    241107-ge6bvayqen

  • MD5

    207acc2d1cd09393d2fc2307b85cd2b8

  • SHA1

    eb441d49d854fa1d7c4c5d61cc7e299aa86a1eab

  • SHA256

    92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65

  • SHA512

    200011513133ec95d9be77abb56b0475f3f1be0a95af45a1a1ea0e693d06b8697684d494e110d4c56bb626a1a50b4e172f3c3af4c80dca66ced3ca98e4d3f2d0

  • SSDEEP

    12288:9MrHy90LAqKKdoNrLG4y8CNqL5p9s54lIKwbyjDQpK2xRN2PGkhsmGqyfF:WyB2d2n0NEtGqDULSPGkOM8F

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65

    • Size

      686KB

    • MD5

      207acc2d1cd09393d2fc2307b85cd2b8

    • SHA1

      eb441d49d854fa1d7c4c5d61cc7e299aa86a1eab

    • SHA256

      92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65

    • SHA512

      200011513133ec95d9be77abb56b0475f3f1be0a95af45a1a1ea0e693d06b8697684d494e110d4c56bb626a1a50b4e172f3c3af4c80dca66ced3ca98e4d3f2d0

    • SSDEEP

      12288:9MrHy90LAqKKdoNrLG4y8CNqL5p9s54lIKwbyjDQpK2xRN2PGkhsmGqyfF:WyB2d2n0NEtGqDULSPGkOM8F

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks