General

  • Target

    7f681d174f10c73ba43e59803b0ff90d67b177875a6844b5cc5a5de4626c79c9N.exe

  • Size

    506KB

  • Sample

    241119-rey8ms1qhk

  • MD5

    155ffe24711d784961a1f91a38f26090

  • SHA1

    f45f788c1d7a542134e1e0cb74fb15f60adc0471

  • SHA256

    7f681d174f10c73ba43e59803b0ff90d67b177875a6844b5cc5a5de4626c79c9

  • SHA512

    92661c411479aaaafc5e2486187dc21a6ccb7e69ca650ddd96c14853162a2bd63da11ac149c58aa54af37d8a0485bd537fada540f73d22c54a2c1f25761e0af7

  • SSDEEP

    12288:jMrvy90p9ccBUGVGW4HMAK2zhwTei8N51jtyK+RE0s44:IycTP4vwp8N51jtyKUEnd

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Targets

    • Target

      7f681d174f10c73ba43e59803b0ff90d67b177875a6844b5cc5a5de4626c79c9N.exe

    • Size

      506KB

    • MD5

      155ffe24711d784961a1f91a38f26090

    • SHA1

      f45f788c1d7a542134e1e0cb74fb15f60adc0471

    • SHA256

      7f681d174f10c73ba43e59803b0ff90d67b177875a6844b5cc5a5de4626c79c9

    • SHA512

      92661c411479aaaafc5e2486187dc21a6ccb7e69ca650ddd96c14853162a2bd63da11ac149c58aa54af37d8a0485bd537fada540f73d22c54a2c1f25761e0af7

    • SSDEEP

      12288:jMrvy90p9ccBUGVGW4HMAK2zhwTei8N51jtyK+RE0s44:IycTP4vwp8N51jtyKUEnd

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks