General

  • Target

    822cb7b6fc534626018354dc2f11707c6c5f80dc886a5969a8071a8c2d0259b9

  • Size

    1019KB

  • Sample

    241109-ngs8matcmn

  • MD5

    f720c892930320ab4b03302e107b7ff1

  • SHA1

    00f339c55660d51a8aac5149e692b30e8d9a41af

  • SHA256

    822cb7b6fc534626018354dc2f11707c6c5f80dc886a5969a8071a8c2d0259b9

  • SHA512

    668afaadcfb6307bc46700b8692fa9b969dc83c1bad3c5960373bda7aa6dd35f4570c8ba2f742ef35e60e3a63bed98e6308dd6a3b6f176a54e63298cfd5b8c97

  • SSDEEP

    24576:lp7vNmfuCXulhdgRnfyvst/MOWCoKFlIjDuusOj:to5XKgRqvs+CoU6Lj

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      234e9e282e7f2ad1cbbc5ffc2aa67267eb2d5eaf34542df1f7f891fab36aedfb.exe

    • Size

      1.0MB

    • MD5

      f6e3aa012f0f42e0504ba0c5699eb95b

    • SHA1

      c388ba51516a7ada32a035997a30ca2b0e64a453

    • SHA256

      234e9e282e7f2ad1cbbc5ffc2aa67267eb2d5eaf34542df1f7f891fab36aedfb

    • SHA512

      44c3e644262c94521ddc4f72e6922ea4d3e890c88d8aa5870a100a4f528450ce53db40b7a8ea446dea6a23900bd9b337d85112ab3ab8557910958a332fd58ba3

    • SSDEEP

      24576:HySYMy815XptL4iO/T4cjJ0gcXHEmfgLZwbr+A4KlLd1:SNwZptL4ZFj2gc0Pwm1E

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks