General

  • Target

    45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c

  • Size

    787KB

  • Sample

    241107-rrq3sswngp

  • MD5

    fb3db781effd136ae6997fa8ffde6fc0

  • SHA1

    b18ce34aa1ed9f1cef2766291438fef63967e402

  • SHA256

    45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c

  • SHA512

    e6975f48a66e412e18b31ff8e66382288c0e3d005399cb9274ab3f072a985a98f53397402957fc1ad1ee101780f8e41b53aad17bb6534ba97f4860ea0a036ce0

  • SSDEEP

    12288:7MrQy90tcBHlNbWshlXJWKlp/RN0Ud3Io156Plun2Wba89:XyHHrdXJrpN7d3I0qu2Wn9

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c

    • Size

      787KB

    • MD5

      fb3db781effd136ae6997fa8ffde6fc0

    • SHA1

      b18ce34aa1ed9f1cef2766291438fef63967e402

    • SHA256

      45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c

    • SHA512

      e6975f48a66e412e18b31ff8e66382288c0e3d005399cb9274ab3f072a985a98f53397402957fc1ad1ee101780f8e41b53aad17bb6534ba97f4860ea0a036ce0

    • SSDEEP

      12288:7MrQy90tcBHlNbWshlXJWKlp/RN0Ud3Io156Plun2Wba89:XyHHrdXJrpN7d3I0qu2Wn9

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks