General

  • Target

    1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17

  • Size

    787KB

  • Sample

    241108-fqht9aymbk

  • MD5

    17bcd1f61eaf897006ff7f8c0a18a486

  • SHA1

    4bed0694a3ea82ef65acb21d288a602b932f8a83

  • SHA256

    1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17

  • SHA512

    a9bdbab4d22318020d4c64ddac0bde041e8226510d5585cdf10b6ff3c2dc939c38d2c23976edfbec63f2a11882fa64f9bd27ea053345dd969fcb729ba20e85e4

  • SSDEEP

    12288:2MrMy90mJAMjwtt0MU5aZuJIbZqsh43RH53Wy1udnnhpDx89:Oy30tmHMZuJAZd43R53WmkhpDxu

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17

    • Size

      787KB

    • MD5

      17bcd1f61eaf897006ff7f8c0a18a486

    • SHA1

      4bed0694a3ea82ef65acb21d288a602b932f8a83

    • SHA256

      1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17

    • SHA512

      a9bdbab4d22318020d4c64ddac0bde041e8226510d5585cdf10b6ff3c2dc939c38d2c23976edfbec63f2a11882fa64f9bd27ea053345dd969fcb729ba20e85e4

    • SSDEEP

      12288:2MrMy90mJAMjwtt0MU5aZuJIbZqsh43RH53Wy1udnnhpDx89:Oy30tmHMZuJAZd43R53WmkhpDxu

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks