General

  • Target

    63ae309bd0b7c61f65009fbb6a9fa7dcf04e11a140d8d4de13c3f253c52eda93N.exe

  • Size

    931KB

  • Sample

    250212-w4wahasncx

  • MD5

    e66cc4aec2b41c860bcc0cb8a12e9670

  • SHA1

    af7f460dcf12550afffdc6441074a847b3707e4a

  • SHA256

    63ae309bd0b7c61f65009fbb6a9fa7dcf04e11a140d8d4de13c3f253c52eda93

  • SHA512

    388309ca56a20654bb3761540d90445eb1ee018fc5c6e3886c991d53fe9fc546d43042e21e9defd1c0b4660d5cfac9e47f66781db089dd9876d3c735d2dcfd9c

  • SSDEEP

    24576:qyJ+ybVfPhLylGpvfqJTI6wMEhK5RlwFG846fnx2:xJ3tPhGlGCUJhKjlwFZ

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

litor

C2

77.91.124.145:4125

Attributes
  • auth_value

    d39ced97dbbaa8eab490390c2e2a6a10

Targets

    • Target

      63ae309bd0b7c61f65009fbb6a9fa7dcf04e11a140d8d4de13c3f253c52eda93N.exe

    • Size

      931KB

    • MD5

      e66cc4aec2b41c860bcc0cb8a12e9670

    • SHA1

      af7f460dcf12550afffdc6441074a847b3707e4a

    • SHA256

      63ae309bd0b7c61f65009fbb6a9fa7dcf04e11a140d8d4de13c3f253c52eda93

    • SHA512

      388309ca56a20654bb3761540d90445eb1ee018fc5c6e3886c991d53fe9fc546d43042e21e9defd1c0b4660d5cfac9e47f66781db089dd9876d3c735d2dcfd9c

    • SSDEEP

      24576:qyJ+ybVfPhLylGpvfqJTI6wMEhK5RlwFG846fnx2:xJ3tPhGlGCUJhKjlwFZ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender TamperProtection settings

    • Modifies Windows Defender notification settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks