General

  • Target

    aab1d19399f3b330153c4e71d44e9389a5dd97803367fcf71400ca48fe03c355

  • Size

    670KB

  • Sample

    241106-katzsswhna

  • MD5

    0efed57606ef7a87bbd654b6a12ebc82

  • SHA1

    cec5f1570edb6557a90aba92f069d290bdfcb389

  • SHA256

    aab1d19399f3b330153c4e71d44e9389a5dd97803367fcf71400ca48fe03c355

  • SHA512

    042a7360da85ca025db68e9040eb3824219d9391191c790f5f3e463a3a5dbf050d68ff21b0f46e6e438672046553a9e892f0f43689af14ec231ecc54a0beafaa

  • SSDEEP

    12288:uMrNy90Gys6tDSHRRe1ruNVz5v5aV32PsVPP6X6EEhcWCT:/yPysEDSzHVz5v5aVc6PyvDWg

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      aab1d19399f3b330153c4e71d44e9389a5dd97803367fcf71400ca48fe03c355

    • Size

      670KB

    • MD5

      0efed57606ef7a87bbd654b6a12ebc82

    • SHA1

      cec5f1570edb6557a90aba92f069d290bdfcb389

    • SHA256

      aab1d19399f3b330153c4e71d44e9389a5dd97803367fcf71400ca48fe03c355

    • SHA512

      042a7360da85ca025db68e9040eb3824219d9391191c790f5f3e463a3a5dbf050d68ff21b0f46e6e438672046553a9e892f0f43689af14ec231ecc54a0beafaa

    • SSDEEP

      12288:uMrNy90Gys6tDSHRRe1ruNVz5v5aV32PsVPP6X6EEhcWCT:/yPysEDSzHVz5v5aVc6PyvDWg

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks