General

  • Target

    eac08f03fca10085fc06d025106834ac037bfa8b90f3b569725bfe753f06f60f.exe

  • Size

    923KB

  • Sample

    241114-c2b93asndy

  • MD5

    909c804ade1314240cd9724eb7ac541f

  • SHA1

    7c3bc9f1e4f370c1631ef54da863ceb8df2f7f9e

  • SHA256

    eac08f03fca10085fc06d025106834ac037bfa8b90f3b569725bfe753f06f60f

  • SHA512

    ce05090e3b43df8c0f4a9f75db435bbeb39a98e60c0f37600976b565b65ae9691cba1e03a7c7634bf006e07610e9983a01ee14b8fd88450b897b0269fca00a91

  • SSDEEP

    24576:IyFFoz7u17SvbRJ41a4GvUIjLALgrh+u+nOoGikcL:PgIo4EJFwgr4u+nOBe

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

dezik

C2

77.91.124.145:4125

Attributes
  • auth_value

    afab3a79f84bd5003ef2824211bcf14e

Targets

    • Target

      eac08f03fca10085fc06d025106834ac037bfa8b90f3b569725bfe753f06f60f.exe

    • Size

      923KB

    • MD5

      909c804ade1314240cd9724eb7ac541f

    • SHA1

      7c3bc9f1e4f370c1631ef54da863ceb8df2f7f9e

    • SHA256

      eac08f03fca10085fc06d025106834ac037bfa8b90f3b569725bfe753f06f60f

    • SHA512

      ce05090e3b43df8c0f4a9f75db435bbeb39a98e60c0f37600976b565b65ae9691cba1e03a7c7634bf006e07610e9983a01ee14b8fd88450b897b0269fca00a91

    • SSDEEP

      24576:IyFFoz7u17SvbRJ41a4GvUIjLALgrh+u+nOoGikcL:PgIo4EJFwgr4u+nOBe

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks