General

  • Target

    a5f0fbc911d801092f455034c1ee2829e0a1296eaf7b8f39c16712b3367f96bb

  • Size

    685KB

  • Sample

    241111-bs2mxssnfm

  • MD5

    4eeee85e0ca5766cb674427e41216cc8

  • SHA1

    b6f7ab335ca8a58d90f2b5b4d4c99c530a74e956

  • SHA256

    a5f0fbc911d801092f455034c1ee2829e0a1296eaf7b8f39c16712b3367f96bb

  • SHA512

    ca47b3c1f03a5ca1b6c36ac3bc5feaf23ae57e4d7a658b56b933c09deea1f1a7d6f09f0d06e6cca5fcc14c41008cdec0564d807ac03bc26ec164f0ab93934dff

  • SSDEEP

    12288:LMrxy90QKULNUEzjI1u5p9o54pIjwbyODQEJ2xANNKJvfeUp9GphP0yQ:Oybdg1+gG7DhGAKJvfN9aP0n

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      a5f0fbc911d801092f455034c1ee2829e0a1296eaf7b8f39c16712b3367f96bb

    • Size

      685KB

    • MD5

      4eeee85e0ca5766cb674427e41216cc8

    • SHA1

      b6f7ab335ca8a58d90f2b5b4d4c99c530a74e956

    • SHA256

      a5f0fbc911d801092f455034c1ee2829e0a1296eaf7b8f39c16712b3367f96bb

    • SHA512

      ca47b3c1f03a5ca1b6c36ac3bc5feaf23ae57e4d7a658b56b933c09deea1f1a7d6f09f0d06e6cca5fcc14c41008cdec0564d807ac03bc26ec164f0ab93934dff

    • SSDEEP

      12288:LMrxy90QKULNUEzjI1u5p9o54pIjwbyODQEJ2xANNKJvfeUp9GphP0yQ:Oybdg1+gG7DhGAKJvfN9aP0n

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks