General

  • Target

    46f14c7eafe0fd6e49a86d0d9a9f45773117077795f19c9a8db08c649475eb4cN.exe

  • Size

    506KB

  • Sample

    241115-y4ph3avmhq

  • MD5

    4907a61ae08d6a0ce366f826f967c270

  • SHA1

    3f49d0a79408b98920f1f48d2fa674ec73fb9724

  • SHA256

    46f14c7eafe0fd6e49a86d0d9a9f45773117077795f19c9a8db08c649475eb4c

  • SHA512

    a849d00d19557a52d04f908699a39f96fd8ee22390a8be108cfd652c2d34f800744987cb8b2233f780f29dfbc2bf1a557921e0c46338bff3a572699e15f5d0fa

  • SSDEEP

    12288:1MrWy90eHtWzTRPYYPXe4Ov/lEslDTc22ry:vyzHGAYWPv/l1c2D

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Targets

    • Target

      46f14c7eafe0fd6e49a86d0d9a9f45773117077795f19c9a8db08c649475eb4cN.exe

    • Size

      506KB

    • MD5

      4907a61ae08d6a0ce366f826f967c270

    • SHA1

      3f49d0a79408b98920f1f48d2fa674ec73fb9724

    • SHA256

      46f14c7eafe0fd6e49a86d0d9a9f45773117077795f19c9a8db08c649475eb4c

    • SHA512

      a849d00d19557a52d04f908699a39f96fd8ee22390a8be108cfd652c2d34f800744987cb8b2233f780f29dfbc2bf1a557921e0c46338bff3a572699e15f5d0fa

    • SSDEEP

      12288:1MrWy90eHtWzTRPYYPXe4Ov/lEslDTc22ry:vyzHGAYWPv/l1c2D

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks