General

  • Target

    6690f19f1640a6882443ef78298df996aed675a84f549976d462a8fa3204fe5f

  • Size

    661KB

  • Sample

    241109-sx9yjazmbr

  • MD5

    f20a27fdef19af0583d1bd6a1909d1a7

  • SHA1

    98b857c8b039ffbf5f613542faaee92349b6f1ce

  • SHA256

    6690f19f1640a6882443ef78298df996aed675a84f549976d462a8fa3204fe5f

  • SHA512

    0a0877a687a314f00e8aa1737e9e8177a3870ba29a702b0c906439647d1fa7d9e8744db73a1e013d2814a6f7aecb827dd14dba5d78bef6e39907e3cd652e7f3b

  • SSDEEP

    12288:UMrty90hPW/oB1uG9Ihdkawj+xuPSQ/h/cqp9IFbiSVAM5VGmv3XQ:hyO/uz2j+xuPSQ5Ybi2tG0Q

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      6690f19f1640a6882443ef78298df996aed675a84f549976d462a8fa3204fe5f

    • Size

      661KB

    • MD5

      f20a27fdef19af0583d1bd6a1909d1a7

    • SHA1

      98b857c8b039ffbf5f613542faaee92349b6f1ce

    • SHA256

      6690f19f1640a6882443ef78298df996aed675a84f549976d462a8fa3204fe5f

    • SHA512

      0a0877a687a314f00e8aa1737e9e8177a3870ba29a702b0c906439647d1fa7d9e8744db73a1e013d2814a6f7aecb827dd14dba5d78bef6e39907e3cd652e7f3b

    • SSDEEP

      12288:UMrty90hPW/oB1uG9Ihdkawj+xuPSQ/h/cqp9IFbiSVAM5VGmv3XQ:hyO/uz2j+xuPSQ5Ybi2tG0Q

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks