General

  • Target

    f59dc4ed32c5e93178c2a4c3894bfd7a63c766aa6dcb2fe7f1b2b3c2464871b2

  • Size

    851KB

  • Sample

    241106-kfr3dswlcx

  • MD5

    3f0aae1e30a2110fc730f97f8e4d35e1

  • SHA1

    e7f294251dd4b289292217ea3ae8e21989c49613

  • SHA256

    f59dc4ed32c5e93178c2a4c3894bfd7a63c766aa6dcb2fe7f1b2b3c2464871b2

  • SHA512

    881a36e1839b3bcbe209564e796968236144832f617d2acc3cec4db5b37046236626ae8d8537b10cd2ddf35e534a7b88c20494912eb8265773a2367bdd3b4a85

  • SSDEEP

    24576:oy0ir4wU5d3Izb+4GSWymPN/0D9qOYJUZA:vLrbUYbLNccZqOKU

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      f59dc4ed32c5e93178c2a4c3894bfd7a63c766aa6dcb2fe7f1b2b3c2464871b2

    • Size

      851KB

    • MD5

      3f0aae1e30a2110fc730f97f8e4d35e1

    • SHA1

      e7f294251dd4b289292217ea3ae8e21989c49613

    • SHA256

      f59dc4ed32c5e93178c2a4c3894bfd7a63c766aa6dcb2fe7f1b2b3c2464871b2

    • SHA512

      881a36e1839b3bcbe209564e796968236144832f617d2acc3cec4db5b37046236626ae8d8537b10cd2ddf35e534a7b88c20494912eb8265773a2367bdd3b4a85

    • SSDEEP

      24576:oy0ir4wU5d3Izb+4GSWymPN/0D9qOYJUZA:vLrbUYbLNccZqOKU

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks