General

  • Target

    82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5

  • Size

    660KB

  • Sample

    241111-a2t4rsxray

  • MD5

    3ca3b3ab00c86782dac5bf45b2f4fdc6

  • SHA1

    06fecff11bd5b8a3c388a4373b272eb14f449bfa

  • SHA256

    82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5

  • SHA512

    b1c9ec0d4cb369eb14909efee88de72bc78f32da74d02099458863665714a2d35833b58d0021bc053ef2695b58ceda4d43ac4700993425b1f8339ec3a6f7aebb

  • SSDEEP

    12288:tMrgy90bkOsNvFSYQC0OqF9r+awB/MPTecS8ZicC9yqbQT8n5bEh3XLGDS5:NyGapwM05r+awO/n6ySg3h5

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5

    • Size

      660KB

    • MD5

      3ca3b3ab00c86782dac5bf45b2f4fdc6

    • SHA1

      06fecff11bd5b8a3c388a4373b272eb14f449bfa

    • SHA256

      82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5

    • SHA512

      b1c9ec0d4cb369eb14909efee88de72bc78f32da74d02099458863665714a2d35833b58d0021bc053ef2695b58ceda4d43ac4700993425b1f8339ec3a6f7aebb

    • SSDEEP

      12288:tMrgy90bkOsNvFSYQC0OqF9r+awB/MPTecS8ZicC9yqbQT8n5bEh3XLGDS5:NyGapwM05r+awO/n6ySg3h5

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks