General

  • Target

    eed8504a1733b319089f43d5d5c46a66e17533fcd3c5fcdd0b6f2d73171f4197

  • Size

    853KB

  • Sample

    241107-bn7y5ssepq

  • MD5

    29bd1021b1bdd2d34a6e72f3ea84945d

  • SHA1

    a24353468ae34d0a80df91cd94a7710a829ac690

  • SHA256

    eed8504a1733b319089f43d5d5c46a66e17533fcd3c5fcdd0b6f2d73171f4197

  • SHA512

    97841d979a6ef1e1dd338b61421010321247f21ded65f6cfbcfa51e2ea9801cb7da4596319702633767cb5b59d2ed594b443dc0c977cd410a56d534fdce826d1

  • SSDEEP

    24576:myRSlzrkoGK2JtdKpns2nKruyavIZYCL:1ElzGK0HgnhnKrtavaYC

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      eed8504a1733b319089f43d5d5c46a66e17533fcd3c5fcdd0b6f2d73171f4197

    • Size

      853KB

    • MD5

      29bd1021b1bdd2d34a6e72f3ea84945d

    • SHA1

      a24353468ae34d0a80df91cd94a7710a829ac690

    • SHA256

      eed8504a1733b319089f43d5d5c46a66e17533fcd3c5fcdd0b6f2d73171f4197

    • SHA512

      97841d979a6ef1e1dd338b61421010321247f21ded65f6cfbcfa51e2ea9801cb7da4596319702633767cb5b59d2ed594b443dc0c977cd410a56d534fdce826d1

    • SSDEEP

      24576:myRSlzrkoGK2JtdKpns2nKruyavIZYCL:1ElzGK0HgnhnKrtavaYC

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks