General

  • Target

    80592e2f56cc27ffa2bee5102fd78ac701e034c5d512e6c91e99789c6c61438c

  • Size

    651KB

  • Sample

    241107-tktw8avhle

  • MD5

    5b663ea46153bf9d9bdfb5227e50a30f

  • SHA1

    12eb7a473a2dd8699105b31103398e391af59600

  • SHA256

    80592e2f56cc27ffa2bee5102fd78ac701e034c5d512e6c91e99789c6c61438c

  • SHA512

    917986f906e42b40a8702879c66ebaae36339fa7e1115cd05987a891787246ab6c52dfdbbdb86ee5f09da8fc1d3842236f2a35a2299a36011730debb1a6936cd

  • SSDEEP

    12288:TMrhy90ka6AGIrnlqljCr6uyhal3xpgGdqyr8m6yKT2nAiV:KyuLNYljCByegGzf6yKT2AY

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      80592e2f56cc27ffa2bee5102fd78ac701e034c5d512e6c91e99789c6c61438c

    • Size

      651KB

    • MD5

      5b663ea46153bf9d9bdfb5227e50a30f

    • SHA1

      12eb7a473a2dd8699105b31103398e391af59600

    • SHA256

      80592e2f56cc27ffa2bee5102fd78ac701e034c5d512e6c91e99789c6c61438c

    • SHA512

      917986f906e42b40a8702879c66ebaae36339fa7e1115cd05987a891787246ab6c52dfdbbdb86ee5f09da8fc1d3842236f2a35a2299a36011730debb1a6936cd

    • SSDEEP

      12288:TMrhy90ka6AGIrnlqljCr6uyhal3xpgGdqyr8m6yKT2nAiV:KyuLNYljCByegGzf6yKT2AY

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks