General

  • Target

    55ea1cd7df53eaeff335d13a7208830865adeb18ae12ca11abbc93c679ebf866

  • Size

    652KB

  • Sample

    241108-hm4cwsxgnb

  • MD5

    837fb14788dde14cbf50ad6f9efc6add

  • SHA1

    9ca062d77de743d4646815a08f9b55adbdcd1e58

  • SHA256

    55ea1cd7df53eaeff335d13a7208830865adeb18ae12ca11abbc93c679ebf866

  • SHA512

    46831d41d0014bc300e6d0219a7d65ee59821c90a4a3b23278ecf61922e9eecd2135ef0e179f7cad7ad6608de19ac45953fb84045ab096dd51a1ecc3fd20dbd3

  • SSDEEP

    12288:yMrvy90Qcs6hMIiiot2jzorTyA3IiDr74Psg4V/4O4fQMcvA:Nyzi/owjsKP/lffQS

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      55ea1cd7df53eaeff335d13a7208830865adeb18ae12ca11abbc93c679ebf866

    • Size

      652KB

    • MD5

      837fb14788dde14cbf50ad6f9efc6add

    • SHA1

      9ca062d77de743d4646815a08f9b55adbdcd1e58

    • SHA256

      55ea1cd7df53eaeff335d13a7208830865adeb18ae12ca11abbc93c679ebf866

    • SHA512

      46831d41d0014bc300e6d0219a7d65ee59821c90a4a3b23278ecf61922e9eecd2135ef0e179f7cad7ad6608de19ac45953fb84045ab096dd51a1ecc3fd20dbd3

    • SSDEEP

      12288:yMrvy90Qcs6hMIiiot2jzorTyA3IiDr74Psg4V/4O4fQMcvA:Nyzi/owjsKP/lffQS

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks