General

  • Target

    7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6

  • Size

    1.2MB

  • Sample

    241104-q3kvgs1djn

  • MD5

    c138b4ad338d4e6c6e509b18304b93cb

  • SHA1

    45f4bdefb17524ae36e0f72536ef8de994ea5546

  • SHA256

    7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6

  • SHA512

    c1b6012d72e308a05a956d63ae4c4dcb05d12bfa2dfa56477ff397951d2ceb55bc86f6f1f7977bb3862e4be3926386699ec2825461105c5b8d7bcd06b013a883

  • SSDEEP

    24576:2ymUbuNITkx2meCm43H85IF18M1P9NQ/KdWZAJu+vtg0349Z:F8JXjF18M1lW/KdWZatgJ

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6

    • Size

      1.2MB

    • MD5

      c138b4ad338d4e6c6e509b18304b93cb

    • SHA1

      45f4bdefb17524ae36e0f72536ef8de994ea5546

    • SHA256

      7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6

    • SHA512

      c1b6012d72e308a05a956d63ae4c4dcb05d12bfa2dfa56477ff397951d2ceb55bc86f6f1f7977bb3862e4be3926386699ec2825461105c5b8d7bcd06b013a883

    • SSDEEP

      24576:2ymUbuNITkx2meCm43H85IF18M1P9NQ/KdWZAJu+vtg0349Z:F8JXjF18M1lW/KdWZatgJ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks