General

  • Target

    ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba

  • Size

    787KB

  • Sample

    241107-rgv9rswlhq

  • MD5

    d67b7615c3bbe2856c9decf41d8b4bbc

  • SHA1

    ddf47ee023e8dc89189fbfa5e650a1549f696228

  • SHA256

    ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba

  • SHA512

    0dc36d8b4334aabf9d2b3d590ec8a7d40b8d2e658b82293b6b3017bcd578343d6e7ae8b1369789cdd54c7a9970fd22b126bd32facd926dba53bb836ee07818eb

  • SSDEEP

    24576:My7V7+JBp7Qqo5CljUWUt6eZXi3zmdsnTHpvCZU:77+cqo4ljYUsUmdsTJvCZ

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba

    • Size

      787KB

    • MD5

      d67b7615c3bbe2856c9decf41d8b4bbc

    • SHA1

      ddf47ee023e8dc89189fbfa5e650a1549f696228

    • SHA256

      ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba

    • SHA512

      0dc36d8b4334aabf9d2b3d590ec8a7d40b8d2e658b82293b6b3017bcd578343d6e7ae8b1369789cdd54c7a9970fd22b126bd32facd926dba53bb836ee07818eb

    • SSDEEP

      24576:My7V7+JBp7Qqo5CljUWUt6eZXi3zmdsnTHpvCZU:77+cqo4ljYUsUmdsTJvCZ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks