General

  • Target

    6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea

  • Size

    794KB

  • Sample

    241108-jk9mka1kgm

  • MD5

    fb26fdd13c93d3fdabd20e01af2ee9ed

  • SHA1

    ca5fb2f0366db3fa7db33e2bb820cdc110030a0b

  • SHA256

    6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea

  • SHA512

    d4888933c48de8f383a539e5d35d500da69c152f3403f84df48e447e3657ba5353976bbef80a89d53de715abc78c6942078c6051c526a87f2daafe4150856765

  • SSDEEP

    24576:hyW70a1Z6Sg6d50GcPLzo9zTJG0wd36drkOQw3kX:UO0PSP50NPLzCord4Qw0

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea

    • Size

      794KB

    • MD5

      fb26fdd13c93d3fdabd20e01af2ee9ed

    • SHA1

      ca5fb2f0366db3fa7db33e2bb820cdc110030a0b

    • SHA256

      6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea

    • SHA512

      d4888933c48de8f383a539e5d35d500da69c152f3403f84df48e447e3657ba5353976bbef80a89d53de715abc78c6942078c6051c526a87f2daafe4150856765

    • SSDEEP

      24576:hyW70a1Z6Sg6d50GcPLzo9zTJG0wd36drkOQw3kX:UO0PSP50NPLzCord4Qw0

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks