General

  • Target

    245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa

  • Size

    810KB

  • Sample

    241107-l17t1szfqa

  • MD5

    96167d45107ca8081b7a8cd3c02e52e3

  • SHA1

    6c3540e9197c2504bd22135f2bc966ee93a16bdd

  • SHA256

    245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa

  • SHA512

    d71fc94b0eab822e00c9ae5f154fdf8f433765e167eba636c767f2654098dd117d5ee67c3aacf2edd02f2dbaeb2fc62f51e684bb2ec907168f0fad2cd693be67

  • SSDEEP

    12288:pMr+y905UQm+B2KqxtihAc0n9njXs1IAdWcyMxQKXPwYME:3yYU82KGt/cmiFdxPXYRE

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa

    • Size

      810KB

    • MD5

      96167d45107ca8081b7a8cd3c02e52e3

    • SHA1

      6c3540e9197c2504bd22135f2bc966ee93a16bdd

    • SHA256

      245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa

    • SHA512

      d71fc94b0eab822e00c9ae5f154fdf8f433765e167eba636c767f2654098dd117d5ee67c3aacf2edd02f2dbaeb2fc62f51e684bb2ec907168f0fad2cd693be67

    • SSDEEP

      12288:pMr+y905UQm+B2KqxtihAc0n9njXs1IAdWcyMxQKXPwYME:3yYU82KGt/cmiFdxPXYRE

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks