General

  • Target

    62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5

  • Size

    684KB

  • Sample

    241111-bkwfyasmcl

  • MD5

    9cedecac80429e4e2548899236e2a3fd

  • SHA1

    ee3e85c72236b246220178803b67fdd12e454808

  • SHA256

    62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5

  • SHA512

    eb5cf75655c7ce10089a87731f40c97d29eb7a9c8f05a27b5dfd79f6f798805c68b59b1f08e10dc3fa27f6fc07bfaa2dd0a8a4c635a9abcf0c1937e6c6eb1453

  • SSDEEP

    12288:uMrMy90qgkP6CWn2yMjfirWFLz73eMiWgXSLOZKwB2OQ0qVks+6B:+y4h1MjZLHetrrN2OQ0qVr

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5

    • Size

      684KB

    • MD5

      9cedecac80429e4e2548899236e2a3fd

    • SHA1

      ee3e85c72236b246220178803b67fdd12e454808

    • SHA256

      62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5

    • SHA512

      eb5cf75655c7ce10089a87731f40c97d29eb7a9c8f05a27b5dfd79f6f798805c68b59b1f08e10dc3fa27f6fc07bfaa2dd0a8a4c635a9abcf0c1937e6c6eb1453

    • SSDEEP

      12288:uMrMy90qgkP6CWn2yMjfirWFLz73eMiWgXSLOZKwB2OQ0qVks+6B:+y4h1MjZLHetrrN2OQ0qVr

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks