General

  • Target

    96c0dd9611e78a4d7e3ea39144005f6416b3eb087505b8b52d61d80be77adc4e

  • Size

    787KB

  • Sample

    241108-a3c7mszrhx

  • MD5

    92ec9a03c7887fec9dc475906de470b8

  • SHA1

    87cdfa056a376e161bb8fd840ed4b28c880a0db3

  • SHA256

    96c0dd9611e78a4d7e3ea39144005f6416b3eb087505b8b52d61d80be77adc4e

  • SHA512

    575b358b72c2dbf7b5c476598eb819ba1349c60db542eae01a5148510904b747b788d12fbc67bf4c9b1b42ee2fba98004b677589a74a4ea28ef8b8f351962886

  • SSDEEP

    12288:cMrgy901xGeX8ApZhfv5JOsryND4U32yM53Hm15gXCubFTlL6/z:Uy28AZv5JLO332t53Hinu+

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      96c0dd9611e78a4d7e3ea39144005f6416b3eb087505b8b52d61d80be77adc4e

    • Size

      787KB

    • MD5

      92ec9a03c7887fec9dc475906de470b8

    • SHA1

      87cdfa056a376e161bb8fd840ed4b28c880a0db3

    • SHA256

      96c0dd9611e78a4d7e3ea39144005f6416b3eb087505b8b52d61d80be77adc4e

    • SHA512

      575b358b72c2dbf7b5c476598eb819ba1349c60db542eae01a5148510904b747b788d12fbc67bf4c9b1b42ee2fba98004b677589a74a4ea28ef8b8f351962886

    • SSDEEP

      12288:cMrgy901xGeX8ApZhfv5JOsryND4U32yM53Hm15gXCubFTlL6/z:Uy28AZv5JLO332t53Hinu+

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks