General

  • Target

    c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6

  • Size

    661KB

  • Sample

    241108-key5bayjhw

  • MD5

    b7bbf63ea9f9ce62c6c46d6910dce749

  • SHA1

    10e0eb666b67e54d169ea276031401a77d73c382

  • SHA256

    c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6

  • SHA512

    6b22a21ad2feae14976fc6a4b8f403965ebe8a3f45a8a0d13d92f01b555780a437a0e378e2d2da15fa5b257ea13026d4fa0af9d7e1499c2b6ad4f4e259de46ff

  • SSDEEP

    12288:SMrsy90WFh+HX6yMCsXibI8j6c61f6JHlSxhlu4I4piPJBaOF/SHpg:KytFgCObI8ju1SJHlSlu4I7BRhYpg

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6

    • Size

      661KB

    • MD5

      b7bbf63ea9f9ce62c6c46d6910dce749

    • SHA1

      10e0eb666b67e54d169ea276031401a77d73c382

    • SHA256

      c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6

    • SHA512

      6b22a21ad2feae14976fc6a4b8f403965ebe8a3f45a8a0d13d92f01b555780a437a0e378e2d2da15fa5b257ea13026d4fa0af9d7e1499c2b6ad4f4e259de46ff

    • SSDEEP

      12288:SMrsy90WFh+HX6yMCsXibI8j6c61f6JHlSxhlu4I4piPJBaOF/SHpg:KytFgCObI8ju1SJHlSlu4I7BRhYpg

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks