General

  • Target

    2120747aee937752643597b4017e1432371235997bbc9cf0bd3be85b4765b1d1

  • Size

    789KB

  • Sample

    241109-x6w59a1apn

  • MD5

    e95326131e12d852606f2d21b5916c5e

  • SHA1

    edaa063e8682f9aa913c5049be037360db2f8b5a

  • SHA256

    2120747aee937752643597b4017e1432371235997bbc9cf0bd3be85b4765b1d1

  • SHA512

    98872c1abd5f7d214fabf756ecabc061b69c2b76dc1c6ea2d5f473528f9854adc42636d5042c156da3b9f85e12d07efa5ece6061c869cd4d04d4761e6021c13e

  • SSDEEP

    12288:2MrGy90m12UzgEX1mMKYsL9zFdWInTnADriem5tPsGX7eOC8mhkcL:Eyp12UzgSkMKJJbRBPFX7eOVMkcL

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      2120747aee937752643597b4017e1432371235997bbc9cf0bd3be85b4765b1d1

    • Size

      789KB

    • MD5

      e95326131e12d852606f2d21b5916c5e

    • SHA1

      edaa063e8682f9aa913c5049be037360db2f8b5a

    • SHA256

      2120747aee937752643597b4017e1432371235997bbc9cf0bd3be85b4765b1d1

    • SHA512

      98872c1abd5f7d214fabf756ecabc061b69c2b76dc1c6ea2d5f473528f9854adc42636d5042c156da3b9f85e12d07efa5ece6061c869cd4d04d4761e6021c13e

    • SSDEEP

      12288:2MrGy90m12UzgEX1mMKYsL9zFdWInTnADriem5tPsGX7eOC8mhkcL:Eyp12UzgSkMKJJbRBPFX7eOVMkcL

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks