General

  • Target

    d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e

  • Size

    787KB

  • Sample

    241108-a15h4s1fpf

  • MD5

    59f25b8822f1055d9bcdc1c7f4047df1

  • SHA1

    746729e648d483d97994006280ade0e4042f16d4

  • SHA256

    d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e

  • SHA512

    1139187d903a14008bda4b5b34c72a52a9b1ddd4c3b041073e6d0e86241044ad5069bcccf47f70608fa5a03a055e7a1c4aa5b219c53edde4748904a8cdbab8de

  • SSDEEP

    12288:WMrAy90OnbU9kKqcyh4K2Gql2Tss1f3j3ppgGVqZ18vHo5QeVaoNVFB:qy3+0q3CsslIG8AIKePN

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e

    • Size

      787KB

    • MD5

      59f25b8822f1055d9bcdc1c7f4047df1

    • SHA1

      746729e648d483d97994006280ade0e4042f16d4

    • SHA256

      d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e

    • SHA512

      1139187d903a14008bda4b5b34c72a52a9b1ddd4c3b041073e6d0e86241044ad5069bcccf47f70608fa5a03a055e7a1c4aa5b219c53edde4748904a8cdbab8de

    • SSDEEP

      12288:WMrAy90OnbU9kKqcyh4K2Gql2Tss1f3j3ppgGVqZ18vHo5QeVaoNVFB:qy3+0q3CsslIG8AIKePN

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks