General

  • Target

    801ea580270e18663d7d6613d8fedb40a67a1ff3a4d3ee78dbc06fb280a53212

  • Size

    850KB

  • Sample

    241105-vms85svdmc

  • MD5

    a76bb584b6996490fe3e6e4d71c68eae

  • SHA1

    f7149d724cfbc009e2e57a9ad5ce0e90e2f49acd

  • SHA256

    801ea580270e18663d7d6613d8fedb40a67a1ff3a4d3ee78dbc06fb280a53212

  • SHA512

    eaa88e4233a5ad2b319d82abb635ecae1fa20014ea0a5a1c3e82ce58711be0fd935a90dabcf1efec6300613918bf6d4f9501ee006b3fba0bd524f519b6b5ce1f

  • SSDEEP

    24576:2yYxh87gESnXqBqt0AmsiOgnx240GYUqQw:F6875SaA0FfO8240GPN

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      801ea580270e18663d7d6613d8fedb40a67a1ff3a4d3ee78dbc06fb280a53212

    • Size

      850KB

    • MD5

      a76bb584b6996490fe3e6e4d71c68eae

    • SHA1

      f7149d724cfbc009e2e57a9ad5ce0e90e2f49acd

    • SHA256

      801ea580270e18663d7d6613d8fedb40a67a1ff3a4d3ee78dbc06fb280a53212

    • SHA512

      eaa88e4233a5ad2b319d82abb635ecae1fa20014ea0a5a1c3e82ce58711be0fd935a90dabcf1efec6300613918bf6d4f9501ee006b3fba0bd524f519b6b5ce1f

    • SSDEEP

      24576:2yYxh87gESnXqBqt0AmsiOgnx240GYUqQw:F6875SaA0FfO8240GPN

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks