General

  • Target

    4b3045c5dd8473bc0630fd19b51d3db5f0e4deeb489b69a4b481c2b3c18245f3

  • Size

    650KB

  • Sample

    241108-ptplmssdrg

  • MD5

    be63f11849bd0c85de11b64131509ec6

  • SHA1

    305ca631263b507de56245fed7449e3383ec8481

  • SHA256

    4b3045c5dd8473bc0630fd19b51d3db5f0e4deeb489b69a4b481c2b3c18245f3

  • SHA512

    b704d7b15f40e2a86303bf9993671f0d0e960382fb0d1d3808cf46f71fb41b8547217f8c12a6491ab8df636b8af3769a57ad2139156b84d8fdc9018100fb1aae

  • SSDEEP

    12288:KMrDy90+YlrACeQsT7u9FKQrziX3vU5Y+SVuLi5p3yNG9:5ylyrFufu9FKQrmX3vYMuLi5p3yN8

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      4b3045c5dd8473bc0630fd19b51d3db5f0e4deeb489b69a4b481c2b3c18245f3

    • Size

      650KB

    • MD5

      be63f11849bd0c85de11b64131509ec6

    • SHA1

      305ca631263b507de56245fed7449e3383ec8481

    • SHA256

      4b3045c5dd8473bc0630fd19b51d3db5f0e4deeb489b69a4b481c2b3c18245f3

    • SHA512

      b704d7b15f40e2a86303bf9993671f0d0e960382fb0d1d3808cf46f71fb41b8547217f8c12a6491ab8df636b8af3769a57ad2139156b84d8fdc9018100fb1aae

    • SSDEEP

      12288:KMrDy90+YlrACeQsT7u9FKQrziX3vU5Y+SVuLi5p3yNG9:5ylyrFufu9FKQrmX3vYMuLi5p3yN8

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks