General

  • Target

    6c98f989026665809f305a47b76de4380c71c6b0105b9aa2e1696c96633ae0d3

  • Size

    660KB

  • Sample

    241111-as31bayepa

  • MD5

    27823f9a50d6abe015a6ac4e71c434c0

  • SHA1

    1a222fe98e556a3fd43eea05cb84749d5779f15a

  • SHA256

    6c98f989026665809f305a47b76de4380c71c6b0105b9aa2e1696c96633ae0d3

  • SHA512

    e77027b9b763ca5d6758f28b8ffc4841eca6a3a2bcf915da09eebbcc74805d38c839402f5c369c025f60402ad318768a1d4ee34f78feecaae3e11ced43e55af3

  • SSDEEP

    12288:qMrfy90uhJP3HsVrySgoEqS+lj0Sl+ZJcUpcIObYhqbMmGLKEJwBKx:ZyjcISg3+lj0SlOgbYaMmGLBKKx

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

dozt

C2

77.91.124.145:4125

Attributes
  • auth_value

    857bdfe4fa14711025859d89f18b32cb

Targets

    • Target

      6c98f989026665809f305a47b76de4380c71c6b0105b9aa2e1696c96633ae0d3

    • Size

      660KB

    • MD5

      27823f9a50d6abe015a6ac4e71c434c0

    • SHA1

      1a222fe98e556a3fd43eea05cb84749d5779f15a

    • SHA256

      6c98f989026665809f305a47b76de4380c71c6b0105b9aa2e1696c96633ae0d3

    • SHA512

      e77027b9b763ca5d6758f28b8ffc4841eca6a3a2bcf915da09eebbcc74805d38c839402f5c369c025f60402ad318768a1d4ee34f78feecaae3e11ced43e55af3

    • SSDEEP

      12288:qMrfy90uhJP3HsVrySgoEqS+lj0Sl+ZJcUpcIObYhqbMmGLKEJwBKx:ZyjcISg3+lj0SlOgbYaMmGLBKKx

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks