General

  • Target

    0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c

  • Size

    788KB

  • Sample

    241107-qd6qnaskb1

  • MD5

    4e6f60799124a82140db48fcb1a9185e

  • SHA1

    423ecedccf4e4b38b17f9636b571377020f2b1e5

  • SHA256

    0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c

  • SHA512

    a7d646dcd85fa7841335bf9097f0950f898d23c7072b1375709052bef0ec6584d7a8dab0d4b2c0d90f021f8015466d23c0f3fd84967713a50a4a68e9dc8b64cf

  • SSDEEP

    12288:hMrIy90wNOiuCXOar1nlwp21b+wEYjpZo0/To3mpgGVq828vtNTONI3Wu:ByHfXOaRlscpZqrGJL/TOYJ

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c

    • Size

      788KB

    • MD5

      4e6f60799124a82140db48fcb1a9185e

    • SHA1

      423ecedccf4e4b38b17f9636b571377020f2b1e5

    • SHA256

      0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c

    • SHA512

      a7d646dcd85fa7841335bf9097f0950f898d23c7072b1375709052bef0ec6584d7a8dab0d4b2c0d90f021f8015466d23c0f3fd84967713a50a4a68e9dc8b64cf

    • SSDEEP

      12288:hMrIy90wNOiuCXOar1nlwp21b+wEYjpZo0/To3mpgGVq828vtNTONI3Wu:ByHfXOaRlscpZqrGJL/TOYJ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks