General

  • Target

    b39d242e00e8fd718e77ec147a3ef9160a8b2f064b2f04a521590c5ffe216223

  • Size

    1.0MB

  • Sample

    241110-gfdcfs1bnp

  • MD5

    cb1ac9ae48dffa2ef1dc579553c0e72a

  • SHA1

    4d99907fe01c713c2b9a50f88e84507a3a334e7b

  • SHA256

    b39d242e00e8fd718e77ec147a3ef9160a8b2f064b2f04a521590c5ffe216223

  • SHA512

    25627afc018a9ce683b7cefd452e8b5a8f113b8378f2508b898cb8101ff854f84353e3178d4e4fac966a434bf82dec079c2fe8a861a5476bc7fa29b8c4fc5bbe

  • SSDEEP

    24576:gylsBfCtSpmZIStXdi6zSldnDDIupRG6k3BFjADo:nlkfgvZi2SDD0uRG5hA

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      b39d242e00e8fd718e77ec147a3ef9160a8b2f064b2f04a521590c5ffe216223

    • Size

      1.0MB

    • MD5

      cb1ac9ae48dffa2ef1dc579553c0e72a

    • SHA1

      4d99907fe01c713c2b9a50f88e84507a3a334e7b

    • SHA256

      b39d242e00e8fd718e77ec147a3ef9160a8b2f064b2f04a521590c5ffe216223

    • SHA512

      25627afc018a9ce683b7cefd452e8b5a8f113b8378f2508b898cb8101ff854f84353e3178d4e4fac966a434bf82dec079c2fe8a861a5476bc7fa29b8c4fc5bbe

    • SSDEEP

      24576:gylsBfCtSpmZIStXdi6zSldnDDIupRG6k3BFjADo:nlkfgvZi2SDD0uRG5hA

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks