General

  • Target

    2545fa99e9617b0351441a6845ab1695e89ab36be63377040fe53e6627c919c4

  • Size

    787KB

  • Sample

    241107-kxcn2azcjm

  • MD5

    472904ad7dc4de12de415ddb838c8d02

  • SHA1

    b5e14f8aab467425dd9e46ca91201b7f0310e2dd

  • SHA256

    2545fa99e9617b0351441a6845ab1695e89ab36be63377040fe53e6627c919c4

  • SHA512

    13adf931d30c4eb3f8b54a92a0fbd2abe4bb65ab1fe0c56a9e0c01a07870d542e9c5db894693f292b4dc9cca542c79e0c7c3edf0d930b23f176fcab35e1a1a09

  • SSDEEP

    12288:8MrGy90KeFePzaqhMb2lXJsKAqS7iZg4Xkx3bU11db9FNhcr:iyVPzXM8XJsiu4Ux3b49FPcr

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      2545fa99e9617b0351441a6845ab1695e89ab36be63377040fe53e6627c919c4

    • Size

      787KB

    • MD5

      472904ad7dc4de12de415ddb838c8d02

    • SHA1

      b5e14f8aab467425dd9e46ca91201b7f0310e2dd

    • SHA256

      2545fa99e9617b0351441a6845ab1695e89ab36be63377040fe53e6627c919c4

    • SHA512

      13adf931d30c4eb3f8b54a92a0fbd2abe4bb65ab1fe0c56a9e0c01a07870d542e9c5db894693f292b4dc9cca542c79e0c7c3edf0d930b23f176fcab35e1a1a09

    • SSDEEP

      12288:8MrGy90KeFePzaqhMb2lXJsKAqS7iZg4Xkx3bU11db9FNhcr:iyVPzXM8XJsiu4Ux3b49FPcr

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks