General

  • Target

    8638ced33a78e00b623ef0624239c4336f9aa5f11081681702d24103b658a306

  • Size

    660KB

  • Sample

    241107-llymssyqht

  • MD5

    4827734ae14867b92e5c1995b4b12fca

  • SHA1

    7bef53de0a41ae68245c64cf1eca778f2349bd12

  • SHA256

    8638ced33a78e00b623ef0624239c4336f9aa5f11081681702d24103b658a306

  • SHA512

    3a1df1777f32e2b0dcf77853c9aaf2bd0f5d59098874a04728096574a09741ae84e48f11c7db514d368f34e062bfe74544a6cb9ba64cb03616fb36894f6d1e7c

  • SSDEEP

    12288:lMrSy90UKjgxFF8ysAMZA4GOHXAF2y/ltslDTk7a4zyN+8JSSwt:rypKjy8ysASAROwUy/li+fWsqc

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      8638ced33a78e00b623ef0624239c4336f9aa5f11081681702d24103b658a306

    • Size

      660KB

    • MD5

      4827734ae14867b92e5c1995b4b12fca

    • SHA1

      7bef53de0a41ae68245c64cf1eca778f2349bd12

    • SHA256

      8638ced33a78e00b623ef0624239c4336f9aa5f11081681702d24103b658a306

    • SHA512

      3a1df1777f32e2b0dcf77853c9aaf2bd0f5d59098874a04728096574a09741ae84e48f11c7db514d368f34e062bfe74544a6cb9ba64cb03616fb36894f6d1e7c

    • SSDEEP

      12288:lMrSy90UKjgxFF8ysAMZA4GOHXAF2y/ltslDTk7a4zyN+8JSSwt:rypKjy8ysASAROwUy/li+fWsqc

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks