General

  • Target

    467af0108af9c89ad38f3a6fc2594edaa43043516805a927e7223be720a4d972

  • Size

    810KB

  • Sample

    241105-x4bfrswndz

  • MD5

    e12e2e825bbd118241437e6be000446f

  • SHA1

    4fb463b406bb7d0d4e9ab9dba822d1a2cd12595a

  • SHA256

    467af0108af9c89ad38f3a6fc2594edaa43043516805a927e7223be720a4d972

  • SHA512

    dfb68e95a97e2e96d34630edb8163e4b8ed1f94697d6c74ae81b2dff33a789c10b6e35405bf720c3ce73c8f0a28a796bbf6f33a41ba27dd954630d6d30f2fd51

  • SSDEEP

    12288:3MrKy9015LPUCY3lUyJoRdulnVLhdAQCcF4D+5/yWRDM:VyaIUyyRIlPdeD+7RDM

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      467af0108af9c89ad38f3a6fc2594edaa43043516805a927e7223be720a4d972

    • Size

      810KB

    • MD5

      e12e2e825bbd118241437e6be000446f

    • SHA1

      4fb463b406bb7d0d4e9ab9dba822d1a2cd12595a

    • SHA256

      467af0108af9c89ad38f3a6fc2594edaa43043516805a927e7223be720a4d972

    • SHA512

      dfb68e95a97e2e96d34630edb8163e4b8ed1f94697d6c74ae81b2dff33a789c10b6e35405bf720c3ce73c8f0a28a796bbf6f33a41ba27dd954630d6d30f2fd51

    • SSDEEP

      12288:3MrKy9015LPUCY3lUyJoRdulnVLhdAQCcF4D+5/yWRDM:VyaIUyyRIlPdeD+7RDM

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks