General

  • Target

    26737d3d2ba1e6059e5944647c7c84035c33c025803fd21930b822d05a6e09ce

  • Size

    660KB

  • Sample

    241110-3t87ya1kek

  • MD5

    62838cdcccf6c5940ea7e5fb27a1fa17

  • SHA1

    2e8b6cf75454b64a654d1c7fadbc39d88a8910c7

  • SHA256

    26737d3d2ba1e6059e5944647c7c84035c33c025803fd21930b822d05a6e09ce

  • SHA512

    0cfd47a7c5d9f2b149ea622107839ed3b7f7d22d319970dad8aa512d1c15f0446931fa90b050b7523319e5a4415d7fabac91f10714e1460b9c990d57b5909b6f

  • SSDEEP

    12288:hMrgy90M9vFM48DOiPUhC6WJFQMcqhIxw1du0IlRqNLptYgPjxoc+k3:RyFp3ziPU+JOqyJqNnYg2fu

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

dozt

C2

77.91.124.145:4125

Attributes
  • auth_value

    857bdfe4fa14711025859d89f18b32cb

Targets

    • Target

      26737d3d2ba1e6059e5944647c7c84035c33c025803fd21930b822d05a6e09ce

    • Size

      660KB

    • MD5

      62838cdcccf6c5940ea7e5fb27a1fa17

    • SHA1

      2e8b6cf75454b64a654d1c7fadbc39d88a8910c7

    • SHA256

      26737d3d2ba1e6059e5944647c7c84035c33c025803fd21930b822d05a6e09ce

    • SHA512

      0cfd47a7c5d9f2b149ea622107839ed3b7f7d22d319970dad8aa512d1c15f0446931fa90b050b7523319e5a4415d7fabac91f10714e1460b9c990d57b5909b6f

    • SSDEEP

      12288:hMrgy90M9vFM48DOiPUhC6WJFQMcqhIxw1du0IlRqNLptYgPjxoc+k3:RyFp3ziPU+JOqyJqNnYg2fu

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks