General

  • Target

    1918625ba1864fdc598278707ab1f74f5c9b5d1615d22bfb102597f312340394

  • Size

    810KB

  • Sample

    241104-t6rnzswkfk

  • MD5

    d8ac5fedb57e6bf906364f62b504fbc0

  • SHA1

    ca892b05accb6fdd1fa32d6a1ee52b6b72c84de0

  • SHA256

    1918625ba1864fdc598278707ab1f74f5c9b5d1615d22bfb102597f312340394

  • SHA512

    8a5c7e43eb8d92007311337885894c40c7bd63819fa4dc4f0efd5048d7952a7fe229bd438080f3e724e7062392e793ae704d72555cda6628e49dfc79e549c8a5

  • SSDEEP

    12288:+MrIy90DoXH2fTVmJS5Woro6TH+e4H+5WwKV9x2z43A4Oc4VQcMbgDelqzsV:qycoKVm6WC/aeoNhl/bgD4KsV

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      1918625ba1864fdc598278707ab1f74f5c9b5d1615d22bfb102597f312340394

    • Size

      810KB

    • MD5

      d8ac5fedb57e6bf906364f62b504fbc0

    • SHA1

      ca892b05accb6fdd1fa32d6a1ee52b6b72c84de0

    • SHA256

      1918625ba1864fdc598278707ab1f74f5c9b5d1615d22bfb102597f312340394

    • SHA512

      8a5c7e43eb8d92007311337885894c40c7bd63819fa4dc4f0efd5048d7952a7fe229bd438080f3e724e7062392e793ae704d72555cda6628e49dfc79e549c8a5

    • SSDEEP

      12288:+MrIy90DoXH2fTVmJS5Woro6TH+e4H+5WwKV9x2z43A4Oc4VQcMbgDelqzsV:qycoKVm6WC/aeoNhl/bgD4KsV

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks