General

  • Target

    75b21363eb446d456292c4d31ef906624c98ff8f7bc949e325e398d75de9694d

  • Size

    1.1MB

  • Sample

    241104-q6xnfszmew

  • MD5

    6b031b44266f843d1e8f75cd784a4b24

  • SHA1

    5b92f6a9f2e55abfb0d3aff1eba07ec8d3d6a3c7

  • SHA256

    75b21363eb446d456292c4d31ef906624c98ff8f7bc949e325e398d75de9694d

  • SHA512

    3327e00984d56b672aad3773d704250f2e1a3b87567de24cb22c31c66ab2a7d11f95d1a08e5d8d2dd01a873da548087e65c28c90b3a841c8814656be65416b96

  • SSDEEP

    24576:Hy0p3TywCwIESPtiApPpc1tp3aUUprxJEzo3XOFopf:S0pDFGwwsv3arxCU+o

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Targets

    • Target

      75b21363eb446d456292c4d31ef906624c98ff8f7bc949e325e398d75de9694d

    • Size

      1.1MB

    • MD5

      6b031b44266f843d1e8f75cd784a4b24

    • SHA1

      5b92f6a9f2e55abfb0d3aff1eba07ec8d3d6a3c7

    • SHA256

      75b21363eb446d456292c4d31ef906624c98ff8f7bc949e325e398d75de9694d

    • SHA512

      3327e00984d56b672aad3773d704250f2e1a3b87567de24cb22c31c66ab2a7d11f95d1a08e5d8d2dd01a873da548087e65c28c90b3a841c8814656be65416b96

    • SSDEEP

      24576:Hy0p3TywCwIESPtiApPpc1tp3aUUprxJEzo3XOFopf:S0pDFGwwsv3arxCU+o

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks