General

  • Target

    ea9c75754a3f694a1843edc34fd963d13f1099518f967c3741bda78a7a894009

  • Size

    810KB

  • Sample

    241106-s97zpsskfx

  • MD5

    7b874a134db68429bd5c8124b9decd16

  • SHA1

    454913d8c344f69c55b629bd0e31c48f5fe0359b

  • SHA256

    ea9c75754a3f694a1843edc34fd963d13f1099518f967c3741bda78a7a894009

  • SHA512

    080c8009bedbcdd89c39caa30e3321ed45a93336312b17b82fc06c64d1169e489938fbb07ffa08b9925e0b8455e2e506dfa342fad84baa226945c3662f21284e

  • SSDEEP

    12288:jMroy90Sx1FQERSCQGvoVT2MxN5rmo39TGg/8Iwy3BAaeczFSdCu/oAe:7ylNQERS5OyT2kNlNqg/hf77FSAMe

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      ea9c75754a3f694a1843edc34fd963d13f1099518f967c3741bda78a7a894009

    • Size

      810KB

    • MD5

      7b874a134db68429bd5c8124b9decd16

    • SHA1

      454913d8c344f69c55b629bd0e31c48f5fe0359b

    • SHA256

      ea9c75754a3f694a1843edc34fd963d13f1099518f967c3741bda78a7a894009

    • SHA512

      080c8009bedbcdd89c39caa30e3321ed45a93336312b17b82fc06c64d1169e489938fbb07ffa08b9925e0b8455e2e506dfa342fad84baa226945c3662f21284e

    • SSDEEP

      12288:jMroy90Sx1FQERSCQGvoVT2MxN5rmo39TGg/8Iwy3BAaeczFSdCu/oAe:7ylNQERS5OyT2kNlNqg/hf77FSAMe

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks