General

  • Target

    372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee

  • Size

    660KB

  • Sample

    241110-d5x7dayjgy

  • MD5

    6397dc4c8cf60c893c2b0b3db01db72a

  • SHA1

    2a48640b3eb35af2a5757793937fb487bd6a6e5f

  • SHA256

    372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee

  • SHA512

    7a482937070a0896f4ce2277995f98e31a1c6aea00306661c6cf6cd5f130d6ec089adbc7a1f85f54c2bad57bdfbb92c32af3f556d101fc434193da07fcb1b229

  • SSDEEP

    12288:dMrky9097j1IDt9/FpE/RPTecl/+MMCWyqbET8zxCpriJ3lT:NycsvbUx8VTyuCa

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee

    • Size

      660KB

    • MD5

      6397dc4c8cf60c893c2b0b3db01db72a

    • SHA1

      2a48640b3eb35af2a5757793937fb487bd6a6e5f

    • SHA256

      372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee

    • SHA512

      7a482937070a0896f4ce2277995f98e31a1c6aea00306661c6cf6cd5f130d6ec089adbc7a1f85f54c2bad57bdfbb92c32af3f556d101fc434193da07fcb1b229

    • SSDEEP

      12288:dMrky9097j1IDt9/FpE/RPTecl/+MMCWyqbET8zxCpriJ3lT:NycsvbUx8VTyuCa

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks