General

  • Target

    ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22

  • Size

    991KB

  • Sample

    241105-lhklrszarm

  • MD5

    029dce407942f6268befcaaea51178c0

  • SHA1

    9b70f6b0eba8bb22c37fa8079c2c9fcb40d989c1

  • SHA256

    ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22

  • SHA512

    bcc67a7f819e8815a31d66bd54922ce8fd0a0d0c05bfd929007ce636b20ff5f0d483013a2c330077e58508069272580dbcc5677ce643bd13e74932d0bcb806ae

  • SSDEEP

    24576:Qye529/t7EQdB5G8/tXsccdnvuwVO/IuPKd5mNlvUh:X5/tbV2cin2wVOAutU

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22

    • Size

      991KB

    • MD5

      029dce407942f6268befcaaea51178c0

    • SHA1

      9b70f6b0eba8bb22c37fa8079c2c9fcb40d989c1

    • SHA256

      ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22

    • SHA512

      bcc67a7f819e8815a31d66bd54922ce8fd0a0d0c05bfd929007ce636b20ff5f0d483013a2c330077e58508069272580dbcc5677ce643bd13e74932d0bcb806ae

    • SSDEEP

      24576:Qye529/t7EQdB5G8/tXsccdnvuwVO/IuPKd5mNlvUh:X5/tbV2cin2wVOAutU

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks