General

  • Target

    9da344c721698ab43e513d0176c3635c8cc3f70268c69248bff43cb94aedf70a

  • Size

    670KB

  • Sample

    241105-lpm1gaxrhy

  • MD5

    49201876ac419407c6171e309d0c267b

  • SHA1

    68ac8886d799df56a0ccf086845ebec323b54356

  • SHA256

    9da344c721698ab43e513d0176c3635c8cc3f70268c69248bff43cb94aedf70a

  • SHA512

    07579ad855cdf63ce21bbe652b1aafade6bb81c9ca19f2905c9643f3ef317e0e70f63b056e2810750b19a73c73ec2f15c03fd4daff9e0aa3696708f9b8bc7c85

  • SSDEEP

    12288:wMr2y90E3vO5uBG+3h4uYhv1r/g4A5vf49//1sV54RRn9n4eqS:WydvOsG+OR24A5vf491654RRnx4eX

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      9da344c721698ab43e513d0176c3635c8cc3f70268c69248bff43cb94aedf70a

    • Size

      670KB

    • MD5

      49201876ac419407c6171e309d0c267b

    • SHA1

      68ac8886d799df56a0ccf086845ebec323b54356

    • SHA256

      9da344c721698ab43e513d0176c3635c8cc3f70268c69248bff43cb94aedf70a

    • SHA512

      07579ad855cdf63ce21bbe652b1aafade6bb81c9ca19f2905c9643f3ef317e0e70f63b056e2810750b19a73c73ec2f15c03fd4daff9e0aa3696708f9b8bc7c85

    • SSDEEP

      12288:wMr2y90E3vO5uBG+3h4uYhv1r/g4A5vf49//1sV54RRn9n4eqS:WydvOsG+OR24A5vf491654RRnx4eX

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks