General

  • Target

    b5b03c05d56b79a9f4a56c2f96ad20feeb2a1cda9ee7d011e6a53c98cfdd35b4

  • Size

    1.0MB

  • Sample

    241111-btxelasnhl

  • MD5

    6115287af96b0be31a40949f2e3bef0c

  • SHA1

    ef8ca652fd03a1de344f024e3066fb7efbfc5940

  • SHA256

    b5b03c05d56b79a9f4a56c2f96ad20feeb2a1cda9ee7d011e6a53c98cfdd35b4

  • SHA512

    67a629c976572f3a1b3868db05780e2baed866d613f4685a737dbb3e7b6c8037ac0287daa2bfbe98f1ba3d4df23f7d557b655f6bf4bbbb65e70ff12f59c3ad89

  • SSDEEP

    24576:kyUn0tDSXRb0pIKlDZjsm0SX3pzPGX00rfQ9ZMgY:zUmDGRhA4m0SNGJrSR

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

dozi

C2

77.91.124.145:4125

Attributes
  • auth_value

    7679b0fc076a24b4239e8d0b3bb429af

Targets

    • Target

      b5b03c05d56b79a9f4a56c2f96ad20feeb2a1cda9ee7d011e6a53c98cfdd35b4

    • Size

      1.0MB

    • MD5

      6115287af96b0be31a40949f2e3bef0c

    • SHA1

      ef8ca652fd03a1de344f024e3066fb7efbfc5940

    • SHA256

      b5b03c05d56b79a9f4a56c2f96ad20feeb2a1cda9ee7d011e6a53c98cfdd35b4

    • SHA512

      67a629c976572f3a1b3868db05780e2baed866d613f4685a737dbb3e7b6c8037ac0287daa2bfbe98f1ba3d4df23f7d557b655f6bf4bbbb65e70ff12f59c3ad89

    • SSDEEP

      24576:kyUn0tDSXRb0pIKlDZjsm0SX3pzPGX00rfQ9ZMgY:zUmDGRhA4m0SNGJrSR

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks