General

  • Target

    739e2d04149ac6944374b028072f1e722ff840bff709cee9f3da952f24ba97cf

  • Size

    810KB

  • Sample

    241106-sg5c4ssdnb

  • MD5

    2a028848dd2405575f9481eac7b1dbf2

  • SHA1

    019c2d15147f938ed7c657889c39a77e7ecb8298

  • SHA256

    739e2d04149ac6944374b028072f1e722ff840bff709cee9f3da952f24ba97cf

  • SHA512

    e8d395ff7ce7da8d56f6ecadcc48ffcd8e81255d735ca6d7309136179b418ab23400278b8a9eecc575a405a04a1cdc8bb67313134f7c06df639d8de0c31d8a1b

  • SSDEEP

    12288:0Mr2y90+O4jMzWqHOR/xIfGWc0deDF3HjBiHkKTRASKcX8iPXOwb8dD:qyzMS82JIfcwkHVMPhLnDb8dD

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      739e2d04149ac6944374b028072f1e722ff840bff709cee9f3da952f24ba97cf

    • Size

      810KB

    • MD5

      2a028848dd2405575f9481eac7b1dbf2

    • SHA1

      019c2d15147f938ed7c657889c39a77e7ecb8298

    • SHA256

      739e2d04149ac6944374b028072f1e722ff840bff709cee9f3da952f24ba97cf

    • SHA512

      e8d395ff7ce7da8d56f6ecadcc48ffcd8e81255d735ca6d7309136179b418ab23400278b8a9eecc575a405a04a1cdc8bb67313134f7c06df639d8de0c31d8a1b

    • SSDEEP

      12288:0Mr2y90+O4jMzWqHOR/xIfGWc0deDF3HjBiHkKTRASKcX8iPXOwb8dD:qyzMS82JIfcwkHVMPhLnDb8dD

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks