General

  • Target

    8f25a9692af85314942f78ddff7a4e3d6308bdf2ecb5dcba4e73ac427e2209db

  • Size

    787KB

  • Sample

    241108-zyzmhszemm

  • MD5

    b260c30fd1b6c288be698b2463ca58a0

  • SHA1

    ad5073d78d82881d4b7e820b3b2ea7238a540a55

  • SHA256

    8f25a9692af85314942f78ddff7a4e3d6308bdf2ecb5dcba4e73ac427e2209db

  • SHA512

    ba048e5f60ea6b6e52ff8de1467c6f0bbf4cabcb6b25b49007e8595334fd8ca6e9c861a04aa3a90044217f300e02b8174ed7315f33d5e4d9462aa9a7543c422c

  • SSDEEP

    12288:oMrUy90AaJgR7CM2cCt2wofs3upgGVqlV8vr3JQE:cybnibjGsgrOE

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      8f25a9692af85314942f78ddff7a4e3d6308bdf2ecb5dcba4e73ac427e2209db

    • Size

      787KB

    • MD5

      b260c30fd1b6c288be698b2463ca58a0

    • SHA1

      ad5073d78d82881d4b7e820b3b2ea7238a540a55

    • SHA256

      8f25a9692af85314942f78ddff7a4e3d6308bdf2ecb5dcba4e73ac427e2209db

    • SHA512

      ba048e5f60ea6b6e52ff8de1467c6f0bbf4cabcb6b25b49007e8595334fd8ca6e9c861a04aa3a90044217f300e02b8174ed7315f33d5e4d9462aa9a7543c422c

    • SSDEEP

      12288:oMrUy90AaJgR7CM2cCt2wofs3upgGVqlV8vr3JQE:cybnibjGsgrOE

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks