General

  • Target

    b013b69f16586d5079eff9059ec0ff6929642b01fbe5038317eefec707e956a0

  • Size

    787KB

  • Sample

    241107-jq8bpaycld

  • MD5

    2dcfe632497ed95262f1dd9d16b9949f

  • SHA1

    6ac4e2d16a913ef2f8b33603474c003d66183f9f

  • SHA256

    b013b69f16586d5079eff9059ec0ff6929642b01fbe5038317eefec707e956a0

  • SHA512

    e2ba87aad9eb29e3621ed50667a52630f9327d0a2d197d7df6ce830929bcb5e98ba2e72972cf5835d1205bc175b7cecbe0e048d1aa93c4d26e04b518be86ecb8

  • SSDEEP

    24576:QyKiXSmhUXqvGJexjIeJl37sPl4KZfCH:XK2S3aOK1rOlnZfC

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      b013b69f16586d5079eff9059ec0ff6929642b01fbe5038317eefec707e956a0

    • Size

      787KB

    • MD5

      2dcfe632497ed95262f1dd9d16b9949f

    • SHA1

      6ac4e2d16a913ef2f8b33603474c003d66183f9f

    • SHA256

      b013b69f16586d5079eff9059ec0ff6929642b01fbe5038317eefec707e956a0

    • SHA512

      e2ba87aad9eb29e3621ed50667a52630f9327d0a2d197d7df6ce830929bcb5e98ba2e72972cf5835d1205bc175b7cecbe0e048d1aa93c4d26e04b518be86ecb8

    • SSDEEP

      24576:QyKiXSmhUXqvGJexjIeJl37sPl4KZfCH:XK2S3aOK1rOlnZfC

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks