General

  • Target

    6717fb543d42520bc0cd7cd738f0acd02297d022c1cf68c0f05538e403bd66a0

  • Size

    926KB

  • Sample

    241108-nz677strar

  • MD5

    34ddcbe8e845a96ba67ec5b51ce8f3b2

  • SHA1

    c3d0358dcb3d0f7f80aeb878f9ac0c6f2b1b3ed1

  • SHA256

    6717fb543d42520bc0cd7cd738f0acd02297d022c1cf68c0f05538e403bd66a0

  • SHA512

    9d383f148bf0b6b0958244740add8a86511ac76ce70d07fbcd550633ce1d3e46786cb2147ed71176408256ca7adffd320ad71cf4d226f68a9485d29a5d8575c6

  • SSDEEP

    24576:9y/f6fSTmk7z9o7zli0g4IIg5aagqUEbuD:YXak7Ez1gjT5aagqbu

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      6717fb543d42520bc0cd7cd738f0acd02297d022c1cf68c0f05538e403bd66a0

    • Size

      926KB

    • MD5

      34ddcbe8e845a96ba67ec5b51ce8f3b2

    • SHA1

      c3d0358dcb3d0f7f80aeb878f9ac0c6f2b1b3ed1

    • SHA256

      6717fb543d42520bc0cd7cd738f0acd02297d022c1cf68c0f05538e403bd66a0

    • SHA512

      9d383f148bf0b6b0958244740add8a86511ac76ce70d07fbcd550633ce1d3e46786cb2147ed71176408256ca7adffd320ad71cf4d226f68a9485d29a5d8575c6

    • SSDEEP

      24576:9y/f6fSTmk7z9o7zli0g4IIg5aagqUEbuD:YXak7Ez1gjT5aagqbu

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks