General

  • Target

    25222696c058b093ea0be867a4a753ad35cd697fd669ac409af1e1a447d847a3N

  • Size

    661KB

  • Sample

    241111-fvz94atfqc

  • MD5

    6391ed408ca7c627e21db3ea68264310

  • SHA1

    85a7bce33522e2d5df86dd9ed3811833cbb25746

  • SHA256

    25222696c058b093ea0be867a4a753ad35cd697fd669ac409af1e1a447d847a3

  • SHA512

    14cf7c1ffba65d13ea3a39731ec39d2dfdf511afb8c8a77d56f13c0e31bb66a1d68c1b4ceaa3742cdb103063022a089a6611cb94eca71529185141890c8abce6

  • SSDEEP

    12288:cMruy90rbntlypN8mt6X/nFobIIL0lIjgvA4IhpiOJ9YKScCB8S7tY:SyUnSNl6X/FobIe0lIgA4Iz9YFF7W

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Targets

    • Target

      25222696c058b093ea0be867a4a753ad35cd697fd669ac409af1e1a447d847a3N

    • Size

      661KB

    • MD5

      6391ed408ca7c627e21db3ea68264310

    • SHA1

      85a7bce33522e2d5df86dd9ed3811833cbb25746

    • SHA256

      25222696c058b093ea0be867a4a753ad35cd697fd669ac409af1e1a447d847a3

    • SHA512

      14cf7c1ffba65d13ea3a39731ec39d2dfdf511afb8c8a77d56f13c0e31bb66a1d68c1b4ceaa3742cdb103063022a089a6611cb94eca71529185141890c8abce6

    • SSDEEP

      12288:cMruy90rbntlypN8mt6X/nFobIIL0lIjgvA4IhpiOJ9YKScCB8S7tY:SyUnSNl6X/FobIe0lIgA4Iz9YFF7W

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks