General

  • Target

    f59e0e74e172dc98bffc678e6517b3526047e9e0d35a6f8b2d8a14917148cb28N

  • Size

    507KB

  • Sample

    241114-e5kfysyjcm

  • MD5

    cc8ebbdd3230447505208f558a782c90

  • SHA1

    ab3da82d144c5e6f473b4a98872343b90e7c5289

  • SHA256

    f59e0e74e172dc98bffc678e6517b3526047e9e0d35a6f8b2d8a14917148cb28

  • SHA512

    0b61b69d99cc1ca26b80607151314aa16b2c947516fd04f1b522c5f742b1405da891278aae191ee9abb7a6ae00a072a7a3adc51959780c7a8ac846b0b3157402

  • SSDEEP

    12288:6Mr/y90oyGk3aldF+E3USz3zZcMpKIPbTH0C/RNN:VysS+E3USzjDbTUyRH

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Targets

    • Target

      f59e0e74e172dc98bffc678e6517b3526047e9e0d35a6f8b2d8a14917148cb28N

    • Size

      507KB

    • MD5

      cc8ebbdd3230447505208f558a782c90

    • SHA1

      ab3da82d144c5e6f473b4a98872343b90e7c5289

    • SHA256

      f59e0e74e172dc98bffc678e6517b3526047e9e0d35a6f8b2d8a14917148cb28

    • SHA512

      0b61b69d99cc1ca26b80607151314aa16b2c947516fd04f1b522c5f742b1405da891278aae191ee9abb7a6ae00a072a7a3adc51959780c7a8ac846b0b3157402

    • SSDEEP

      12288:6Mr/y90oyGk3aldF+E3USz3zZcMpKIPbTH0C/RNN:VysS+E3USzjDbTUyRH

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks