General

  • Target

    f90897c01fe596f0d96cb1f051f5d9f74c6aff43fab5026235182220321054d4

  • Size

    661KB

  • Sample

    241110-vd3ffs1bpr

  • MD5

    db181de662c1572d09ba5cd70aecdf35

  • SHA1

    77a7304f77ad986c6ab3d22f0697cea210205255

  • SHA256

    f90897c01fe596f0d96cb1f051f5d9f74c6aff43fab5026235182220321054d4

  • SHA512

    26b08956b05d679a602b9a34aebda2452d9657d2b51fea7f5967b90754bbe608298651e30d2fd343a1f855618975b9df47330b7fbbef1b92ba3e15c0a634ffdb

  • SSDEEP

    12288:5Mrcy90gAxTVDprqsmpttWZYOHMvt/lkuLCM4I+pi5J5DAmHXh:NyhAxT3rj4ttKYZ/lk1M4IfimHx

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      f90897c01fe596f0d96cb1f051f5d9f74c6aff43fab5026235182220321054d4

    • Size

      661KB

    • MD5

      db181de662c1572d09ba5cd70aecdf35

    • SHA1

      77a7304f77ad986c6ab3d22f0697cea210205255

    • SHA256

      f90897c01fe596f0d96cb1f051f5d9f74c6aff43fab5026235182220321054d4

    • SHA512

      26b08956b05d679a602b9a34aebda2452d9657d2b51fea7f5967b90754bbe608298651e30d2fd343a1f855618975b9df47330b7fbbef1b92ba3e15c0a634ffdb

    • SSDEEP

      12288:5Mrcy90gAxTVDprqsmpttWZYOHMvt/lkuLCM4I+pi5J5DAmHXh:NyhAxT3rj4ttKYZ/lk1M4IfimHx

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks