General

  • Target

    4315c422023326a843927fa8b13ee15355bd7e8008b11d3c4e1f2f35c793599d

  • Size

    926KB

  • Sample

    241109-hk1tzszdpe

  • MD5

    3b8f7ba2c8214022cd66cb87d2269684

  • SHA1

    ed15347f2b141426f727b216cc87c3116b2efaf0

  • SHA256

    4315c422023326a843927fa8b13ee15355bd7e8008b11d3c4e1f2f35c793599d

  • SHA512

    a1d6b78c56c9bfd8d109bd4e3c542189ec99d4fc3beb7c97fe0adb889367220145f99e453a1cab27e5a798f4e07393a6b5e1a5a731970cf7c0efb5446f314ba8

  • SSDEEP

    24576:CyytEUlnl1c9oqQlSKc4IhVdugwoQZo1d3eTB2jyJfKRVZ:pyeUlcOVcjNioDeTBG

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      4315c422023326a843927fa8b13ee15355bd7e8008b11d3c4e1f2f35c793599d

    • Size

      926KB

    • MD5

      3b8f7ba2c8214022cd66cb87d2269684

    • SHA1

      ed15347f2b141426f727b216cc87c3116b2efaf0

    • SHA256

      4315c422023326a843927fa8b13ee15355bd7e8008b11d3c4e1f2f35c793599d

    • SHA512

      a1d6b78c56c9bfd8d109bd4e3c542189ec99d4fc3beb7c97fe0adb889367220145f99e453a1cab27e5a798f4e07393a6b5e1a5a731970cf7c0efb5446f314ba8

    • SSDEEP

      24576:CyytEUlnl1c9oqQlSKc4IhVdugwoQZo1d3eTB2jyJfKRVZ:pyeUlcOVcjNioDeTBG

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks