General

  • Target

    bb6eb4ae3ca979637a7c3b553d9f1437a475fffe7cc13b4caa0279226210802d

  • Size

    685KB

  • Sample

    241107-rfwtxatejd

  • MD5

    65eaed971c52565bf06c31ac54acd351

  • SHA1

    659f726b0e80678d77029907967945222cde8f19

  • SHA256

    bb6eb4ae3ca979637a7c3b553d9f1437a475fffe7cc13b4caa0279226210802d

  • SHA512

    f0e82a9713596b8032402c366799234cfba7a10a4a46e33dea4a49e911179064747f2335ccc668b0ff398d1296a56bc6ed50df2328f43cccd96d11499192c777

  • SSDEEP

    12288:xMryy90mPgNF0BVxq7Wfueu35x9e54pISwbymDQ+F0xNNEt3r1ypUPng/:3yPPgNFGXqifue4FGbDFMEtJyig/

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      bb6eb4ae3ca979637a7c3b553d9f1437a475fffe7cc13b4caa0279226210802d

    • Size

      685KB

    • MD5

      65eaed971c52565bf06c31ac54acd351

    • SHA1

      659f726b0e80678d77029907967945222cde8f19

    • SHA256

      bb6eb4ae3ca979637a7c3b553d9f1437a475fffe7cc13b4caa0279226210802d

    • SHA512

      f0e82a9713596b8032402c366799234cfba7a10a4a46e33dea4a49e911179064747f2335ccc668b0ff398d1296a56bc6ed50df2328f43cccd96d11499192c777

    • SSDEEP

      12288:xMryy90mPgNF0BVxq7Wfueu35x9e54pISwbymDQ+F0xNNEt3r1ypUPng/:3yPPgNFGXqifue4FGbDFMEtJyig/

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks