General

  • Target

    6260571fce8ddcb03ada69503152ff062a9c7366080ee903ba32dabe7c6bb785

  • Size

    660KB

  • Sample

    241108-xfvvhaxfkn

  • MD5

    64a4e65a34086717312b517202d15f61

  • SHA1

    ed52fc014573c10b4bca47ebfbb3288929eb5428

  • SHA256

    6260571fce8ddcb03ada69503152ff062a9c7366080ee903ba32dabe7c6bb785

  • SHA512

    386e41bf368dd0eaa6cbe92f84a2158b19de257815d5fd1a53ca3024bfe5a465bee8bc9c36377c587e8814bf80c9dbc6f0190f956a6d83afd97e59e122e2dcf3

  • SSDEEP

    12288:VMrey90Ly6h5jEVL9e1a9dmBZ12kAB/nPTecUCZdPCPyqbuT8+7rink2dbCh:zymy6DNBZrgPfZKy/Z2pM

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      6260571fce8ddcb03ada69503152ff062a9c7366080ee903ba32dabe7c6bb785

    • Size

      660KB

    • MD5

      64a4e65a34086717312b517202d15f61

    • SHA1

      ed52fc014573c10b4bca47ebfbb3288929eb5428

    • SHA256

      6260571fce8ddcb03ada69503152ff062a9c7366080ee903ba32dabe7c6bb785

    • SHA512

      386e41bf368dd0eaa6cbe92f84a2158b19de257815d5fd1a53ca3024bfe5a465bee8bc9c36377c587e8814bf80c9dbc6f0190f956a6d83afd97e59e122e2dcf3

    • SSDEEP

      12288:VMrey90Ly6h5jEVL9e1a9dmBZ12kAB/nPTecUCZdPCPyqbuT8+7rink2dbCh:zymy6DNBZrgPfZKy/Z2pM

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks