General

  • Target

    2cf5bdb2dd3a108e81c30043426ea8162f814a06ef86122f75034197a1b3e591

  • Size

    1.1MB

  • Sample

    241105-v89s1swekk

  • MD5

    22eb4ca20e10841e75e4d33fa36f47f2

  • SHA1

    98571031ea23d4b9cf2a231fb06184e12adb8fde

  • SHA256

    2cf5bdb2dd3a108e81c30043426ea8162f814a06ef86122f75034197a1b3e591

  • SHA512

    c237a869e62ec076d740f06b18ad0310520a24d653c35b1c3018a0afd0195f1de034fde981647995be0f200aed8730d4449243aceb4cc7afc0ec6fea48c12783

  • SSDEEP

    24576:syw+j3FfqYAcBwx3s/d4XEh0/NOyKW0mX2T:bw+DdTAcBHdyv1Z04

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      2cf5bdb2dd3a108e81c30043426ea8162f814a06ef86122f75034197a1b3e591

    • Size

      1.1MB

    • MD5

      22eb4ca20e10841e75e4d33fa36f47f2

    • SHA1

      98571031ea23d4b9cf2a231fb06184e12adb8fde

    • SHA256

      2cf5bdb2dd3a108e81c30043426ea8162f814a06ef86122f75034197a1b3e591

    • SHA512

      c237a869e62ec076d740f06b18ad0310520a24d653c35b1c3018a0afd0195f1de034fde981647995be0f200aed8730d4449243aceb4cc7afc0ec6fea48c12783

    • SSDEEP

      24576:syw+j3FfqYAcBwx3s/d4XEh0/NOyKW0mX2T:bw+DdTAcBHdyv1Z04

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks