General

  • Target

    1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1

  • Size

    1.0MB

  • Sample

    241110-rz5wxsydqn

  • MD5

    37f7bcb6d24a909fa799dfad47ca6c28

  • SHA1

    6b9a2cc3664db7615219ee10c100be45c854f74e

  • SHA256

    1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1

  • SHA512

    64c8685b9c3f2e87ef1229f3921a779e29eb72717a11497659b02f8915302360f466115c220d4aebc99dbe64068c3a66a2e32f4cb35690b35bee6f3c76d6a6a4

  • SSDEEP

    24576:NyI+yvV4nLtzROhfOPgv+lg7DIIACpi6ufRcJw+4Oi:oJyNQNsh2o+sDTz4Qw+4O

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1

    • Size

      1.0MB

    • MD5

      37f7bcb6d24a909fa799dfad47ca6c28

    • SHA1

      6b9a2cc3664db7615219ee10c100be45c854f74e

    • SHA256

      1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1

    • SHA512

      64c8685b9c3f2e87ef1229f3921a779e29eb72717a11497659b02f8915302360f466115c220d4aebc99dbe64068c3a66a2e32f4cb35690b35bee6f3c76d6a6a4

    • SSDEEP

      24576:NyI+yvV4nLtzROhfOPgv+lg7DIIACpi6ufRcJw+4Oi:oJyNQNsh2o+sDTz4Qw+4O

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks