General

  • Target

    609b34a56e7dfb42a1fc1a9d6b673215107ccd4802f1017754d4979162ff5c06

  • Size

    661KB

  • Sample

    241110-pys5mazncp

  • MD5

    734f9e224b0fbc65cc3190d0bb65b68f

  • SHA1

    130b72bcedfea25b0bb93895fafb1906ecc963a6

  • SHA256

    609b34a56e7dfb42a1fc1a9d6b673215107ccd4802f1017754d4979162ff5c06

  • SHA512

    2b6aaf2bbf2cf5fd039b9b38faa658594b8b878b5f98a6d4a87cf04ac73d05593f73f1a453ea09bfd9151626bfbf8a5592118ef80867dc0dfc99933c9e7cb08e

  • SSDEEP

    12288:yMr+y90nz/BVV+ZJbZ8WiCscpS2ql//QklhElwUT8Ld1YPDfATKHpw0:AyGz/zAZJ9chX6VlsrY3Hi0

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      609b34a56e7dfb42a1fc1a9d6b673215107ccd4802f1017754d4979162ff5c06

    • Size

      661KB

    • MD5

      734f9e224b0fbc65cc3190d0bb65b68f

    • SHA1

      130b72bcedfea25b0bb93895fafb1906ecc963a6

    • SHA256

      609b34a56e7dfb42a1fc1a9d6b673215107ccd4802f1017754d4979162ff5c06

    • SHA512

      2b6aaf2bbf2cf5fd039b9b38faa658594b8b878b5f98a6d4a87cf04ac73d05593f73f1a453ea09bfd9151626bfbf8a5592118ef80867dc0dfc99933c9e7cb08e

    • SSDEEP

      12288:yMr+y90nz/BVV+ZJbZ8WiCscpS2ql//QklhElwUT8Ld1YPDfATKHpw0:AyGz/zAZJ9chX6VlsrY3Hi0

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks