General

  • Target

    87f9a8684d921cb781c527f126319d8b0a3a2443d315b8269ca98d6063b9c0a1

  • Size

    809KB

  • Sample

    241107-a67westpbl

  • MD5

    034cafbaedb2d8010de6103641ff6f54

  • SHA1

    734233dae7de86cfc855f0f71f1f6cc9fa0ae194

  • SHA256

    87f9a8684d921cb781c527f126319d8b0a3a2443d315b8269ca98d6063b9c0a1

  • SHA512

    612881ed81fe2cbb94c6f6ad46e96421e9b6c5f322b7416fcc9ad70855742c75121a2ad870b67738fd60cfad6a49485a2ef5f08865b42b3ef8980cb7e55dbada

  • SSDEEP

    12288:XMrky90a6xG9OxR3Pj0XS4y83PHY3FPS70uzXrFfzwWvqsrV9hC5/8wk:Tyyk9yBPAdn1FzwWvqsrvA5Up

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      87f9a8684d921cb781c527f126319d8b0a3a2443d315b8269ca98d6063b9c0a1

    • Size

      809KB

    • MD5

      034cafbaedb2d8010de6103641ff6f54

    • SHA1

      734233dae7de86cfc855f0f71f1f6cc9fa0ae194

    • SHA256

      87f9a8684d921cb781c527f126319d8b0a3a2443d315b8269ca98d6063b9c0a1

    • SHA512

      612881ed81fe2cbb94c6f6ad46e96421e9b6c5f322b7416fcc9ad70855742c75121a2ad870b67738fd60cfad6a49485a2ef5f08865b42b3ef8980cb7e55dbada

    • SSDEEP

      12288:XMrky90a6xG9OxR3Pj0XS4y83PHY3FPS70uzXrFfzwWvqsrV9hC5/8wk:Tyyk9yBPAdn1FzwWvqsrvA5Up

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks