General

  • Target

    8da3c8cdc0f00af570550df51bf686a3ce9b47980ea71a90bb2ae13bf224ab56

  • Size

    672KB

  • Sample

    241106-krldzswnat

  • MD5

    4ab83561d094f64caea5260d92806990

  • SHA1

    e8692e02d9ccf12c97f318a64906e3ab1c97de78

  • SHA256

    8da3c8cdc0f00af570550df51bf686a3ce9b47980ea71a90bb2ae13bf224ab56

  • SHA512

    d42dd42094e289ceffc437f6ce5fcbe4e0564099199539bb1e42c1bc0db01ccbe6d8e8d74a17b51adb3d8b8b80f6ed479a3a97534771fc64036f7eb0f7044f28

  • SSDEEP

    12288:HMrIy90k3JyEGicWO/1e3kuc7f9GE/H5kFhcx045DBPCqKu1S1Hv:/yF3AtkwElbUC+045QJP

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      8da3c8cdc0f00af570550df51bf686a3ce9b47980ea71a90bb2ae13bf224ab56

    • Size

      672KB

    • MD5

      4ab83561d094f64caea5260d92806990

    • SHA1

      e8692e02d9ccf12c97f318a64906e3ab1c97de78

    • SHA256

      8da3c8cdc0f00af570550df51bf686a3ce9b47980ea71a90bb2ae13bf224ab56

    • SHA512

      d42dd42094e289ceffc437f6ce5fcbe4e0564099199539bb1e42c1bc0db01ccbe6d8e8d74a17b51adb3d8b8b80f6ed479a3a97534771fc64036f7eb0f7044f28

    • SSDEEP

      12288:HMrIy90k3JyEGicWO/1e3kuc7f9GE/H5kFhcx045DBPCqKu1S1Hv:/yF3AtkwElbUC+045QJP

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks