General

  • Target

    39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75

  • Size

    651KB

  • Sample

    241111-cplmzazfql

  • MD5

    34d192027a953277500570d3a97c0417

  • SHA1

    cab046628e7dd1511107ed8727024bb5fd5cc742

  • SHA256

    39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75

  • SHA512

    8a728df0a79ec82cb6d15df5251aaef4d47e672dad143eedbf1ab4e01ca19911abfcb640a1335b628935d003b6c738c247c1863b08bdf174799f36d216dc073d

  • SSDEEP

    12288:cMrBy90YDUkr3wYM15TrtFJhg3epgGAqlr8k+KspwfYzRs/iW:dy6QAn5TcTG3l+Kspwfnd

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75

    • Size

      651KB

    • MD5

      34d192027a953277500570d3a97c0417

    • SHA1

      cab046628e7dd1511107ed8727024bb5fd5cc742

    • SHA256

      39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75

    • SHA512

      8a728df0a79ec82cb6d15df5251aaef4d47e672dad143eedbf1ab4e01ca19911abfcb640a1335b628935d003b6c738c247c1863b08bdf174799f36d216dc073d

    • SSDEEP

      12288:cMrBy90YDUkr3wYM15TrtFJhg3epgGAqlr8k+KspwfYzRs/iW:dy6QAn5TcTG3l+Kspwfnd

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks