General

  • Target

    68c7f696b9a0684deca1ce01fd3b57d29a78fde188e3fe6351dee01ae5972e60

  • Size

    713KB

  • Sample

    241106-xwfqhsvnhw

  • MD5

    fa6e0b551a65cb76287a5d882d163385

  • SHA1

    2bdd8bb308ac7e63197799054f36744802ef551f

  • SHA256

    68c7f696b9a0684deca1ce01fd3b57d29a78fde188e3fe6351dee01ae5972e60

  • SHA512

    3516fac8163e1c468101708f0166b428f7f1e3958d12974ce73147ab25d61d84724d3211535f2b91ced22c62e143cf99d87525b073f150a1448806e434a05b34

  • SSDEEP

    12288:8MrXy90R25CFXU17UXhGT1OUuys9rkhVtJbIodjo3LnXOzTqlzmlIrz1:jyUZk76q1OHtkHIsMLOzTqYIrz1

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      68c7f696b9a0684deca1ce01fd3b57d29a78fde188e3fe6351dee01ae5972e60

    • Size

      713KB

    • MD5

      fa6e0b551a65cb76287a5d882d163385

    • SHA1

      2bdd8bb308ac7e63197799054f36744802ef551f

    • SHA256

      68c7f696b9a0684deca1ce01fd3b57d29a78fde188e3fe6351dee01ae5972e60

    • SHA512

      3516fac8163e1c468101708f0166b428f7f1e3958d12974ce73147ab25d61d84724d3211535f2b91ced22c62e143cf99d87525b073f150a1448806e434a05b34

    • SSDEEP

      12288:8MrXy90R25CFXU17UXhGT1OUuys9rkhVtJbIodjo3LnXOzTqlzmlIrz1:jyUZk76q1OHtkHIsMLOzTqYIrz1

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks