General

  • Target

    75c96adf6a24abccd38780a95363eda7d1fb5bbfc1711c84c2d11d67c2d1f60a

  • Size

    684KB

  • Sample

    241108-astrms1epa

  • MD5

    cb1bbde44c8006e1acb5e9336527fa29

  • SHA1

    c91a091b7e5bf9658c0df18a5592a0bb1b13c0eb

  • SHA256

    75c96adf6a24abccd38780a95363eda7d1fb5bbfc1711c84c2d11d67c2d1f60a

  • SHA512

    30e59e20e9553f79804995dca0c1acb9c081d17ac24881c9899bfef303628bc627898af0d3952829a945390f7c4290bee39e42e3516dcc239eafbee12049d63a

  • SSDEEP

    12288:eMrEy90hKSORYjru030n6FQJ9iL9jlO2LEVSWwPrrSKjjkKbO6kuZM:2yuKSFuEi9iL9o2IVI/YZtu2

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      75c96adf6a24abccd38780a95363eda7d1fb5bbfc1711c84c2d11d67c2d1f60a

    • Size

      684KB

    • MD5

      cb1bbde44c8006e1acb5e9336527fa29

    • SHA1

      c91a091b7e5bf9658c0df18a5592a0bb1b13c0eb

    • SHA256

      75c96adf6a24abccd38780a95363eda7d1fb5bbfc1711c84c2d11d67c2d1f60a

    • SHA512

      30e59e20e9553f79804995dca0c1acb9c081d17ac24881c9899bfef303628bc627898af0d3952829a945390f7c4290bee39e42e3516dcc239eafbee12049d63a

    • SSDEEP

      12288:eMrEy90hKSORYjru030n6FQJ9iL9jlO2LEVSWwPrrSKjjkKbO6kuZM:2yuKSFuEi9iL9o2IVI/YZtu2

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks