General

  • Target

    ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630

  • Size

    660KB

  • Sample

    241110-gblg9s1arr

  • MD5

    b4f4338a28f252eaae707ceefa38f716

  • SHA1

    f638d04e5be045014f5079e35ac4dac848c9fe06

  • SHA256

    ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630

  • SHA512

    64ae46ecab93c98c0acf39fbb9e943b56a6d2a6916cd71daaf34f65ff2479a93470aab21623f0aa3409c215eeb7088bd4474f960964066a88ede70e26cc86a13

  • SSDEEP

    12288:wMrHy90KOyuYveX0zVCLbGA+DECS6LNSc3puIcbSMOcysfeG:nyhNG0zV0bGA+DECS6JwbSlxG

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630

    • Size

      660KB

    • MD5

      b4f4338a28f252eaae707ceefa38f716

    • SHA1

      f638d04e5be045014f5079e35ac4dac848c9fe06

    • SHA256

      ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630

    • SHA512

      64ae46ecab93c98c0acf39fbb9e943b56a6d2a6916cd71daaf34f65ff2479a93470aab21623f0aa3409c215eeb7088bd4474f960964066a88ede70e26cc86a13

    • SSDEEP

      12288:wMrHy90KOyuYveX0zVCLbGA+DECS6LNSc3puIcbSMOcysfeG:nyhNG0zV0bGA+DECS6JwbSlxG

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks