General

  • Target

    6ac918a607f8d576389f3c8991f598fe15747ba5fb3c503c1a7e3b2d1fb602ad

  • Size

    652KB

  • Sample

    241108-sa1fkstlcv

  • MD5

    5f1981b44b44fc6a147ee680df96d232

  • SHA1

    f87563bdd41a19f8df5d217944633e429b793dee

  • SHA256

    6ac918a607f8d576389f3c8991f598fe15747ba5fb3c503c1a7e3b2d1fb602ad

  • SHA512

    d0f43ff44015c38a1780e4e206803f2db93456c026b7d47b2e920a80223383e590d066e2aab5526b20fd2d570c3c5c1eb8f8adfd1927272179689dccd48c7f03

  • SSDEEP

    12288:iMrfy90R6DeblJrfh3wrgY1TCPsni1rWDP0V8VnvXiylbRY4Y:VyI6SjrpcgYprPcwy4Y4Y

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      6ac918a607f8d576389f3c8991f598fe15747ba5fb3c503c1a7e3b2d1fb602ad

    • Size

      652KB

    • MD5

      5f1981b44b44fc6a147ee680df96d232

    • SHA1

      f87563bdd41a19f8df5d217944633e429b793dee

    • SHA256

      6ac918a607f8d576389f3c8991f598fe15747ba5fb3c503c1a7e3b2d1fb602ad

    • SHA512

      d0f43ff44015c38a1780e4e206803f2db93456c026b7d47b2e920a80223383e590d066e2aab5526b20fd2d570c3c5c1eb8f8adfd1927272179689dccd48c7f03

    • SSDEEP

      12288:iMrfy90R6DeblJrfh3wrgY1TCPsni1rWDP0V8VnvXiylbRY4Y:VyI6SjrpcgYprPcwy4Y4Y

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks