General

  • Target

    c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d

  • Size

    787KB

  • Sample

    241107-nxlhqatqel

  • MD5

    c077e608027f1953d97514121b06862a

  • SHA1

    b75cbb80e34bc9f9707cce0ae9fdc9bc497a91d5

  • SHA256

    c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d

  • SHA512

    6d1668b9e200f0020c21d85fd2e8eb32071fe3c1d2fb14a99fc1e6116cbdcf10dc9f14c235b005c063236420f50afbd144729b26c920341b59bc0210dd5361e6

  • SSDEEP

    24576:7yWevcc3TQqo4+Ziv3v7io8pwmLbQ+WV:uu5qoVgvfrfmLbR

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d

    • Size

      787KB

    • MD5

      c077e608027f1953d97514121b06862a

    • SHA1

      b75cbb80e34bc9f9707cce0ae9fdc9bc497a91d5

    • SHA256

      c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d

    • SHA512

      6d1668b9e200f0020c21d85fd2e8eb32071fe3c1d2fb14a99fc1e6116cbdcf10dc9f14c235b005c063236420f50afbd144729b26c920341b59bc0210dd5361e6

    • SSDEEP

      24576:7yWevcc3TQqo4+Ziv3v7io8pwmLbQ+WV:uu5qoVgvfrfmLbR

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks