General

  • Target

    fd236aa924519e23ef3b4c2a438ec5708a54d007d72956470f338115de0c86d6

  • Size

    653KB

  • Sample

    241116-qfystswncs

  • MD5

    4d1895edb6aab4934700bf8086550fcc

  • SHA1

    232e03729dcc3fb708079f4c390e0a68ac001330

  • SHA256

    fd236aa924519e23ef3b4c2a438ec5708a54d007d72956470f338115de0c86d6

  • SHA512

    f56ef325e2adefe711e94c257f62f8b61612027a3f8d1e89e61079f9512f9dfb8e3fd987649acab17b3b69664939fc3e68cf1f468c57ad1c678a217025a65ec0

  • SSDEEP

    12288:rMrhy90PWzo+Qqo6bso8VfHoNTJ9YSiAre4PI04VBguuqC67Zzw7:qyoWFp0f+JPf6z17c

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      fd236aa924519e23ef3b4c2a438ec5708a54d007d72956470f338115de0c86d6

    • Size

      653KB

    • MD5

      4d1895edb6aab4934700bf8086550fcc

    • SHA1

      232e03729dcc3fb708079f4c390e0a68ac001330

    • SHA256

      fd236aa924519e23ef3b4c2a438ec5708a54d007d72956470f338115de0c86d6

    • SHA512

      f56ef325e2adefe711e94c257f62f8b61612027a3f8d1e89e61079f9512f9dfb8e3fd987649acab17b3b69664939fc3e68cf1f468c57ad1c678a217025a65ec0

    • SSDEEP

      12288:rMrhy90PWzo+Qqo6bso8VfHoNTJ9YSiAre4PI04VBguuqC67Zzw7:qyoWFp0f+JPf6z17c

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks