General

  • Target

    51ea117c56e35e2862eee6cd11e67d3c40e251a6ca0c39d77c2bd171a3358407

  • Size

    787KB

  • Sample

    241108-xwp9ysxjfv

  • MD5

    d06434798b582fad8997bc1b8332e4e1

  • SHA1

    3972deb0e8fcb2932cb3cf960f51623e13298980

  • SHA256

    51ea117c56e35e2862eee6cd11e67d3c40e251a6ca0c39d77c2bd171a3358407

  • SHA512

    28c5ccba1c310c861f443af2628a72d8f6f5ed077bff7d1263c37c09c4af24c297f9ff19f1a775dbcd4776a60e3dac069d4e1318631267af8bcbcd630776f7b1

  • SSDEEP

    24576:pyua5SM6JtyFIJyzIgtib3Di4cGcdNST:c75qgIyzIy0vcGgNS

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      51ea117c56e35e2862eee6cd11e67d3c40e251a6ca0c39d77c2bd171a3358407

    • Size

      787KB

    • MD5

      d06434798b582fad8997bc1b8332e4e1

    • SHA1

      3972deb0e8fcb2932cb3cf960f51623e13298980

    • SHA256

      51ea117c56e35e2862eee6cd11e67d3c40e251a6ca0c39d77c2bd171a3358407

    • SHA512

      28c5ccba1c310c861f443af2628a72d8f6f5ed077bff7d1263c37c09c4af24c297f9ff19f1a775dbcd4776a60e3dac069d4e1318631267af8bcbcd630776f7b1

    • SSDEEP

      24576:pyua5SM6JtyFIJyzIgtib3Di4cGcdNST:c75qgIyzIy0vcGgNS

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks