General

  • Target

    6967145694ec1022112b5a471af72c689c48b7f972dc453e2d5da7ee9122f934

  • Size

    850KB

  • Sample

    241108-ad8l9a1blp

  • MD5

    87b889c1fa3b7ecd8bc932032343fad6

  • SHA1

    a60aeb1dcc699f32bedbcd39ef77b219ffc49a97

  • SHA256

    6967145694ec1022112b5a471af72c689c48b7f972dc453e2d5da7ee9122f934

  • SHA512

    49291c196a661625c4c34aacb713589f74a49280949cb3e3bdf16de111422720faa3ae85adf3007eede1fc33f02cdd1fc14f958c5782b968e0c3dfe6cdca2b21

  • SSDEEP

    24576:zy3Fsnjv2zkMCUf+CNs1fabgOl4lbHy6jTz:G3FsjvohCZC+Bajl4lbvjT

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      6967145694ec1022112b5a471af72c689c48b7f972dc453e2d5da7ee9122f934

    • Size

      850KB

    • MD5

      87b889c1fa3b7ecd8bc932032343fad6

    • SHA1

      a60aeb1dcc699f32bedbcd39ef77b219ffc49a97

    • SHA256

      6967145694ec1022112b5a471af72c689c48b7f972dc453e2d5da7ee9122f934

    • SHA512

      49291c196a661625c4c34aacb713589f74a49280949cb3e3bdf16de111422720faa3ae85adf3007eede1fc33f02cdd1fc14f958c5782b968e0c3dfe6cdca2b21

    • SSDEEP

      24576:zy3Fsnjv2zkMCUf+CNs1fabgOl4lbHy6jTz:G3FsjvohCZC+Bajl4lbvjT

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks