General

  • Target

    d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd

  • Size

    1.1MB

  • Sample

    241105-wkmt1swgjq

  • MD5

    0f2d53a43413b6eab11f467e33dc528a

  • SHA1

    99159faa8daf5f21abb75948bf8744d500db27ba

  • SHA256

    d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd

  • SHA512

    dc7b2cef95c3dc5971a37f06265b14a27762c38d4e450f3dc5345005ca93dbc9fbd96631fa11ccbb051be0253590cc88b3925faf25c505e39903ecdf17adbd6d

  • SSDEEP

    24576:Ny2BBEqmlk65j3+2NBWv4Jga8Ne+KuhEeDBcCGZjcl3PYBI6xwXdU:o2ORjJev4Jg1NeqBCCGZQWGX

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd

    • Size

      1.1MB

    • MD5

      0f2d53a43413b6eab11f467e33dc528a

    • SHA1

      99159faa8daf5f21abb75948bf8744d500db27ba

    • SHA256

      d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd

    • SHA512

      dc7b2cef95c3dc5971a37f06265b14a27762c38d4e450f3dc5345005ca93dbc9fbd96631fa11ccbb051be0253590cc88b3925faf25c505e39903ecdf17adbd6d

    • SSDEEP

      24576:Ny2BBEqmlk65j3+2NBWv4Jga8Ne+KuhEeDBcCGZjcl3PYBI6xwXdU:o2ORjJev4Jg1NeqBCCGZQWGX

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks