General

  • Target

    89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87

  • Size

    787KB

  • Sample

    241108-b7kyqasepc

  • MD5

    b751c0257a3bddf32055710ce9ba529c

  • SHA1

    c9105eb339d798c40c33f888a0b787b58978f631

  • SHA256

    89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87

  • SHA512

    ebeeca2df4b997698d8cb366f0f47e1a84b9e95433478a3c4ecb2b6435cfeff600efc6a5be1ccca65d833a8e2ea8112c08d3f2807737b47ca689aab9bb6c78c9

  • SSDEEP

    12288:lMrYy901C4GHKEvKLyyLTwIQqutN/rEv3JRiQ8UGu7L1mNZxlBJ8WulQcO:xyrjsQqutNzEv3JRiQ8QVmPZq/nO

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87

    • Size

      787KB

    • MD5

      b751c0257a3bddf32055710ce9ba529c

    • SHA1

      c9105eb339d798c40c33f888a0b787b58978f631

    • SHA256

      89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87

    • SHA512

      ebeeca2df4b997698d8cb366f0f47e1a84b9e95433478a3c4ecb2b6435cfeff600efc6a5be1ccca65d833a8e2ea8112c08d3f2807737b47ca689aab9bb6c78c9

    • SSDEEP

      12288:lMrYy901C4GHKEvKLyyLTwIQqutN/rEv3JRiQ8UGu7L1mNZxlBJ8WulQcO:xyrjsQqutNzEv3JRiQ8QVmPZq/nO

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks