General

  • Target

    7dcde2b51af7cf5e6e0f14e62c9165e6682ce7f0700dc90b8629754436ee6d23

  • Size

    922KB

  • Sample

    241111-bd3lnsslbm

  • MD5

    b2534bd420cbfbe94a576764b70aa317

  • SHA1

    0ace5dc147490e96d49dbacfa7a0d22368e0e56b

  • SHA256

    7dcde2b51af7cf5e6e0f14e62c9165e6682ce7f0700dc90b8629754436ee6d23

  • SHA512

    4ab0cb3efd1c418f659510a6c5879964202faac886e835a46bf0a53f337dc079e7557f19b44afa39515365c41889f520bee4333d42c99cbda03c8bb4388bd01a

  • SSDEEP

    24576:gyvFvPLj7jGrIO4VlPwavgHl1VmNdOXOZGy5y:n9v37jq4VlwAgHkd6OZl

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

dizon

C2

77.91.124.145:4125

Attributes
  • auth_value

    047038ed6238aaee09c368831591e935

Targets

    • Target

      7dcde2b51af7cf5e6e0f14e62c9165e6682ce7f0700dc90b8629754436ee6d23

    • Size

      922KB

    • MD5

      b2534bd420cbfbe94a576764b70aa317

    • SHA1

      0ace5dc147490e96d49dbacfa7a0d22368e0e56b

    • SHA256

      7dcde2b51af7cf5e6e0f14e62c9165e6682ce7f0700dc90b8629754436ee6d23

    • SHA512

      4ab0cb3efd1c418f659510a6c5879964202faac886e835a46bf0a53f337dc079e7557f19b44afa39515365c41889f520bee4333d42c99cbda03c8bb4388bd01a

    • SSDEEP

      24576:gyvFvPLj7jGrIO4VlPwavgHl1VmNdOXOZGy5y:n9v37jq4VlwAgHkd6OZl

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks