General

  • Target

    5733271d3b9a73b39afb60b83a08fd2a936231608700c61003cfdbd391cbb2c1

  • Size

    852KB

  • Sample

    241107-vgxz5symcp

  • MD5

    b922c5bcdb4af7073fea7ee31dddccb0

  • SHA1

    f8891da7bc3e168bf6e9339c8439da1210c3dffd

  • SHA256

    5733271d3b9a73b39afb60b83a08fd2a936231608700c61003cfdbd391cbb2c1

  • SHA512

    a6b58d8a8e366ecd81f7a7a4f1cb311a05162c05d9dbe33d16386180aaf20e327383f9a0dc39904707428741eda43330f6c025f5e2b20b1529105177c8799cb0

  • SSDEEP

    24576:0yCCFTzDaH5OpJo/PVZgOOwogx1OOf1kT/iE4ex:DCQTzD/PoXVGO9oKn1K/1n

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      5733271d3b9a73b39afb60b83a08fd2a936231608700c61003cfdbd391cbb2c1

    • Size

      852KB

    • MD5

      b922c5bcdb4af7073fea7ee31dddccb0

    • SHA1

      f8891da7bc3e168bf6e9339c8439da1210c3dffd

    • SHA256

      5733271d3b9a73b39afb60b83a08fd2a936231608700c61003cfdbd391cbb2c1

    • SHA512

      a6b58d8a8e366ecd81f7a7a4f1cb311a05162c05d9dbe33d16386180aaf20e327383f9a0dc39904707428741eda43330f6c025f5e2b20b1529105177c8799cb0

    • SSDEEP

      24576:0yCCFTzDaH5OpJo/PVZgOOwogx1OOf1kT/iE4ex:DCQTzD/PoXVGO9oKn1K/1n

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks