General

  • Target

    56172f7742a5588ac0eb99851777f9fd0eb81bf1f50e921c1baa9e71eee7ab12

  • Size

    660KB

  • Sample

    241113-17t9tszldy

  • MD5

    aad54e4e8a808723f7e950b32eac6e82

  • SHA1

    add53241bda9e1e761ea84c24363de8fd16b1b22

  • SHA256

    56172f7742a5588ac0eb99851777f9fd0eb81bf1f50e921c1baa9e71eee7ab12

  • SHA512

    c09c29eedd9d70c7c96d9a0b192fa9b26e62a5db1331cff3d0218b27ed8e537ee2f4b1ae728bfe9b2bcf0dee9cbf69052bc396f681a20b455426052600025294

  • SSDEEP

    12288:jMrYy908w6QR81XZp2fQyF+mmnXTskUb5c4Yo4hzUxUUJNZ54:Xy6fdFsXTJwcmKUxUCn54

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

dozt

C2

77.91.124.145:4125

Attributes
  • auth_value

    857bdfe4fa14711025859d89f18b32cb

Targets

    • Target

      56172f7742a5588ac0eb99851777f9fd0eb81bf1f50e921c1baa9e71eee7ab12

    • Size

      660KB

    • MD5

      aad54e4e8a808723f7e950b32eac6e82

    • SHA1

      add53241bda9e1e761ea84c24363de8fd16b1b22

    • SHA256

      56172f7742a5588ac0eb99851777f9fd0eb81bf1f50e921c1baa9e71eee7ab12

    • SHA512

      c09c29eedd9d70c7c96d9a0b192fa9b26e62a5db1331cff3d0218b27ed8e537ee2f4b1ae728bfe9b2bcf0dee9cbf69052bc396f681a20b455426052600025294

    • SSDEEP

      12288:jMrYy908w6QR81XZp2fQyF+mmnXTskUb5c4Yo4hzUxUUJNZ54:Xy6fdFsXTJwcmKUxUCn54

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks