General

  • Target

    134b183550875799bba88055f4f30bbfa366bfb39f0835c2460afd2fba6e7503

  • Size

    661KB

  • Sample

    241108-tcbexavfnl

  • MD5

    ef5ed4e43f8040fe4c663359f7e036e7

  • SHA1

    a0beb3cb164c00b07d58b1b3fc91ddcd13a0d9b5

  • SHA256

    134b183550875799bba88055f4f30bbfa366bfb39f0835c2460afd2fba6e7503

  • SHA512

    0cb2489e01c2711adb289a67a32ad82493916d519c0a32dab06cd23f06587dd9fb55db85fc7405742c4580f0685277d17031a5e5947028deae2f05548539c4c9

  • SSDEEP

    12288:PMrWy90fgG94j1jEnsJMt2AW9Oqed84QuaoJObcl6xozrqe9ob02YdSD:lyXG94jNEqxU3SsObclItgdU

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      134b183550875799bba88055f4f30bbfa366bfb39f0835c2460afd2fba6e7503

    • Size

      661KB

    • MD5

      ef5ed4e43f8040fe4c663359f7e036e7

    • SHA1

      a0beb3cb164c00b07d58b1b3fc91ddcd13a0d9b5

    • SHA256

      134b183550875799bba88055f4f30bbfa366bfb39f0835c2460afd2fba6e7503

    • SHA512

      0cb2489e01c2711adb289a67a32ad82493916d519c0a32dab06cd23f06587dd9fb55db85fc7405742c4580f0685277d17031a5e5947028deae2f05548539c4c9

    • SSDEEP

      12288:PMrWy90fgG94j1jEnsJMt2AW9Oqed84QuaoJObcl6xozrqe9ob02YdSD:lyXG94jNEqxU3SsObclItgdU

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks