General

  • Target

    a2e705e65e9a892df602d8bf2aca6004a6fe5e4b13890494769cb884e4370e31

  • Size

    810KB

  • Sample

    241106-w6q4kavgle

  • MD5

    f48ee70d070901ca5f34c40d5a44a0e3

  • SHA1

    481f9c3c49f5c8d34836dfcea2f03b4c20220439

  • SHA256

    a2e705e65e9a892df602d8bf2aca6004a6fe5e4b13890494769cb884e4370e31

  • SHA512

    0570f1ce9f2e2cb9bff3b170efd0ec3d49188fa9b2c25dea82fc707df7f193a53f46add1bbe5b8ff8e641414567bed7484a3690bb5eaca68529dfb111872201b

  • SSDEEP

    12288:0Mrhy90+L+YdjRpcJdDJvmthpwffAZ7cFFsYqxmA:NyrL+qbc/dutEIYsYcmA

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      a2e705e65e9a892df602d8bf2aca6004a6fe5e4b13890494769cb884e4370e31

    • Size

      810KB

    • MD5

      f48ee70d070901ca5f34c40d5a44a0e3

    • SHA1

      481f9c3c49f5c8d34836dfcea2f03b4c20220439

    • SHA256

      a2e705e65e9a892df602d8bf2aca6004a6fe5e4b13890494769cb884e4370e31

    • SHA512

      0570f1ce9f2e2cb9bff3b170efd0ec3d49188fa9b2c25dea82fc707df7f193a53f46add1bbe5b8ff8e641414567bed7484a3690bb5eaca68529dfb111872201b

    • SSDEEP

      12288:0Mrhy90+L+YdjRpcJdDJvmthpwffAZ7cFFsYqxmA:NyrL+qbc/dutEIYsYcmA

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks