General

  • Target

    bd2a800b14275a1a3bb76cab2e3737ef1293ae585ad74723022669938d9b4064

  • Size

    1.0MB

  • Sample

    241106-nreg8a1rfm

  • MD5

    27eb0c8a61a1990b4f10d9f17611dca8

  • SHA1

    537e3edb7f451f5422e62669c0ed367da6043224

  • SHA256

    bd2a800b14275a1a3bb76cab2e3737ef1293ae585ad74723022669938d9b4064

  • SHA512

    0dca83191ebbad357b3b25668b43dec21fd6d43f91f39a34fa2fcf66c08bbc7c5eccb05ebe8269c536d7174d5994dbab09a8b0b2e5db1eca12511992d5b33a0f

  • SSDEEP

    24576:hypKeweexnqjASGWNgK3Z4EnJMp0O/wAzAiwQjv/hSVIqE:UhweY0ASRNgl+E096A8jX3q

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      bd2a800b14275a1a3bb76cab2e3737ef1293ae585ad74723022669938d9b4064

    • Size

      1.0MB

    • MD5

      27eb0c8a61a1990b4f10d9f17611dca8

    • SHA1

      537e3edb7f451f5422e62669c0ed367da6043224

    • SHA256

      bd2a800b14275a1a3bb76cab2e3737ef1293ae585ad74723022669938d9b4064

    • SHA512

      0dca83191ebbad357b3b25668b43dec21fd6d43f91f39a34fa2fcf66c08bbc7c5eccb05ebe8269c536d7174d5994dbab09a8b0b2e5db1eca12511992d5b33a0f

    • SSDEEP

      24576:hypKeweexnqjASGWNgK3Z4EnJMp0O/wAzAiwQjv/hSVIqE:UhweY0ASRNgl+E096A8jX3q

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks