General

  • Target

    fa2227307ab73947581456a9ebea3251ce097b51190fde5549d66747d2047887

  • Size

    1.0MB

  • Sample

    241107-j5j8eaxrct

  • MD5

    46bb288a08c3c9179d14638d0d2ae0f3

  • SHA1

    1947d91edca18096d68740075f6ce85dc3fa76ca

  • SHA256

    fa2227307ab73947581456a9ebea3251ce097b51190fde5549d66747d2047887

  • SHA512

    de69665a03979e7377d9a5afcb5672063b0be76d1ec084a68781d385d44adb45ebed1ace194bf2a2f06c3209d7222ba3b78d0db63d21f6649e19a5237b0079b8

  • SSDEEP

    24576:syS15wrie1OwN/fXR1EaJtWg8KehTaK8zSSktrO:b6CjN/HhMKATQ9k

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      fa2227307ab73947581456a9ebea3251ce097b51190fde5549d66747d2047887

    • Size

      1.0MB

    • MD5

      46bb288a08c3c9179d14638d0d2ae0f3

    • SHA1

      1947d91edca18096d68740075f6ce85dc3fa76ca

    • SHA256

      fa2227307ab73947581456a9ebea3251ce097b51190fde5549d66747d2047887

    • SHA512

      de69665a03979e7377d9a5afcb5672063b0be76d1ec084a68781d385d44adb45ebed1ace194bf2a2f06c3209d7222ba3b78d0db63d21f6649e19a5237b0079b8

    • SSDEEP

      24576:syS15wrie1OwN/fXR1EaJtWg8KehTaK8zSSktrO:b6CjN/HhMKATQ9k

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks