General

  • Target

    f719ceb68098a8d8580528cb508c2b61fde8080d3b5c3df94fc85c4f91e3faf9

  • Size

    1.0MB

  • Sample

    241104-q7z5zatkbn

  • MD5

    4f82dbdce363409aab291a6dca1083d3

  • SHA1

    2fb1709945af8f0bad40b92e7c462ad4ee665245

  • SHA256

    f719ceb68098a8d8580528cb508c2b61fde8080d3b5c3df94fc85c4f91e3faf9

  • SHA512

    243f511240d19f8fd80d5d28535edb7bf7b74b5b2f0f2ca299971ddb3d965d3d6f6c4736f3036abec9be463c3d64e1e3bc3c479706d34b73b3b2d4da5b41751b

  • SSDEEP

    24576:UyO3BO36CrsSKep1e9gEUroxloMaCEKH71P:jSq6CoSKep1SpRxq/ZK

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      f719ceb68098a8d8580528cb508c2b61fde8080d3b5c3df94fc85c4f91e3faf9

    • Size

      1.0MB

    • MD5

      4f82dbdce363409aab291a6dca1083d3

    • SHA1

      2fb1709945af8f0bad40b92e7c462ad4ee665245

    • SHA256

      f719ceb68098a8d8580528cb508c2b61fde8080d3b5c3df94fc85c4f91e3faf9

    • SHA512

      243f511240d19f8fd80d5d28535edb7bf7b74b5b2f0f2ca299971ddb3d965d3d6f6c4736f3036abec9be463c3d64e1e3bc3c479706d34b73b3b2d4da5b41751b

    • SSDEEP

      24576:UyO3BO36CrsSKep1e9gEUroxloMaCEKH71P:jSq6CoSKep1SpRxq/ZK

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks