General

  • Target

    9167aa28c7f3cd5345ae77c90ba41d6a779aeacfd60e6d1eb84d1baa4fdae7c1

  • Size

    786KB

  • Sample

    241108-yjyw1aydqq

  • MD5

    16a325e95567bb2106b2df4507dffd23

  • SHA1

    469841a9e9ce326e0b274adaa1fc9dafacaaaf21

  • SHA256

    9167aa28c7f3cd5345ae77c90ba41d6a779aeacfd60e6d1eb84d1baa4fdae7c1

  • SHA512

    3923dc1c2bd2b72efafef36ebca5811d1dea449bebc40860ec872eadde18cd93d0a4140a30ac2cd4246db5d0c242af40bea10f4027631ca8eec81d0e2d5cac04

  • SSDEEP

    12288:vMrGy90SMQs/YFq2tJFbJgMB3m5y8ZWdsB3Y91HgRCuCZHqtYLeyf:1yxWZ2tJFbJ9UjWiB3YrDu8HqYr

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      9167aa28c7f3cd5345ae77c90ba41d6a779aeacfd60e6d1eb84d1baa4fdae7c1

    • Size

      786KB

    • MD5

      16a325e95567bb2106b2df4507dffd23

    • SHA1

      469841a9e9ce326e0b274adaa1fc9dafacaaaf21

    • SHA256

      9167aa28c7f3cd5345ae77c90ba41d6a779aeacfd60e6d1eb84d1baa4fdae7c1

    • SHA512

      3923dc1c2bd2b72efafef36ebca5811d1dea449bebc40860ec872eadde18cd93d0a4140a30ac2cd4246db5d0c242af40bea10f4027631ca8eec81d0e2d5cac04

    • SSDEEP

      12288:vMrGy90SMQs/YFq2tJFbJgMB3m5y8ZWdsB3Y91HgRCuCZHqtYLeyf:1yxWZ2tJFbJ9UjWiB3YrDu8HqYr

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks