General

  • Target

    bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da

  • Size

    660KB

  • Sample

    241111-bvh9csymgv

  • MD5

    b9c50134ae66184428df705ba1335532

  • SHA1

    d2d019bfcbc232994bf3ec28344a0c6cbe483757

  • SHA256

    bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da

  • SHA512

    e6ef16fbe8333b448c2d74ef13cefb054e92efcf9621d3849df0a7b97c542e27bbc4353a2a9e4ee0dd41f0e8a7a0c9515df665b22380936c930ea1d66e843799

  • SSDEEP

    12288:xMrYy90LHftREy8eth75zWYzecAGXOI2e/lJslgT074HzoYn3sd/:1ymlREyVnpALne/lDuWUjd/

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da

    • Size

      660KB

    • MD5

      b9c50134ae66184428df705ba1335532

    • SHA1

      d2d019bfcbc232994bf3ec28344a0c6cbe483757

    • SHA256

      bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da

    • SHA512

      e6ef16fbe8333b448c2d74ef13cefb054e92efcf9621d3849df0a7b97c542e27bbc4353a2a9e4ee0dd41f0e8a7a0c9515df665b22380936c930ea1d66e843799

    • SSDEEP

      12288:xMrYy90LHftREy8eth75zWYzecAGXOI2e/lJslgT074HzoYn3sd/:1ymlREyVnpALne/lDuWUjd/

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks