General

  • Target

    dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b

  • Size

    660KB

  • Sample

    241111-b4865sypdy

  • MD5

    a71d5f827d0ecece1796bcbee63ffa39

  • SHA1

    424d71ea4fc5e6f214dd04bfd297eee5ce9d1d3a

  • SHA256

    dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b

  • SHA512

    5692fea6d3defc470803e95fd260d21202b99980d4798b507700938902a2ec82bfb28b8f82ee4ed7d8311fc5cd3d116fef52fdf4c05a51a0b64adf0b8cf9b571

  • SSDEEP

    12288:hMrqy90EcyDVRKJYmOfgx7E77iUbas4vo+hzxxFs2PcqAQKl:PyaybK+B67E77i7sz0xxFt5s

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

dozt

C2

77.91.124.145:4125

Attributes
  • auth_value

    857bdfe4fa14711025859d89f18b32cb

Targets

    • Target

      dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b

    • Size

      660KB

    • MD5

      a71d5f827d0ecece1796bcbee63ffa39

    • SHA1

      424d71ea4fc5e6f214dd04bfd297eee5ce9d1d3a

    • SHA256

      dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b

    • SHA512

      5692fea6d3defc470803e95fd260d21202b99980d4798b507700938902a2ec82bfb28b8f82ee4ed7d8311fc5cd3d116fef52fdf4c05a51a0b64adf0b8cf9b571

    • SSDEEP

      12288:hMrqy90EcyDVRKJYmOfgx7E77iUbas4vo+hzxxFs2PcqAQKl:PyaybK+B67E77i7sz0xxFt5s

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks