General

  • Target

    04a4ca5dc7f5f9979f4150fc8219a7f47f56a8a425c4422078ec705ff370e6a7

  • Size

    789KB

  • Sample

    241108-mvag1aznet

  • MD5

    6caaf973ce1ec28238732943ebad8673

  • SHA1

    b25a6c3801f083db2ec344d799f2b753ef9b6b40

  • SHA256

    04a4ca5dc7f5f9979f4150fc8219a7f47f56a8a425c4422078ec705ff370e6a7

  • SHA512

    851776b4de787c81ee492590140c8b29f22f9257ae773ade618989e1fdce588c78a6f1981c577065237fa7ec1f90ad6722f5861315a44a9d5cbe7084d348062f

  • SSDEEP

    12288:OMrQy907PyF+Y3C7/cU1sLKcebquIRTNAfDieeDXPsoqVRrmh+maG7:iye4+Yy7/eNmq73Pv8i+mh

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      04a4ca5dc7f5f9979f4150fc8219a7f47f56a8a425c4422078ec705ff370e6a7

    • Size

      789KB

    • MD5

      6caaf973ce1ec28238732943ebad8673

    • SHA1

      b25a6c3801f083db2ec344d799f2b753ef9b6b40

    • SHA256

      04a4ca5dc7f5f9979f4150fc8219a7f47f56a8a425c4422078ec705ff370e6a7

    • SHA512

      851776b4de787c81ee492590140c8b29f22f9257ae773ade618989e1fdce588c78a6f1981c577065237fa7ec1f90ad6722f5861315a44a9d5cbe7084d348062f

    • SSDEEP

      12288:OMrQy907PyF+Y3C7/cU1sLKcebquIRTNAfDieeDXPsoqVRrmh+maG7:iye4+Yy7/eNmq73Pv8i+mh

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks