General

  • Target

    dbc5b2c15536f01dcb639db9eccee632cc89df2876e27898ba3821c97c07a632

  • Size

    1.0MB

  • Sample

    241108-depgjstflk

  • MD5

    c948e264d63ba010f6f903a1a97f1df1

  • SHA1

    efc5c87a2b9ef8a81bc8078d51555850da493dfd

  • SHA256

    dbc5b2c15536f01dcb639db9eccee632cc89df2876e27898ba3821c97c07a632

  • SHA512

    c1b0106dd91f9e12e531ebab0091a8561251b2f45252fd2309c2ea50a4d5b3d979a5d16e5acb8e6e593892f321c1850df3d6b1350420a3919cf24dee840d8e69

  • SSDEEP

    24576:byPQpwy8qFp6dgUqkZIoCHoBon5Z20O4y+Fc1fF0fw3b:OPQpwOudg2IZ/5py+FYF0O

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      dbc5b2c15536f01dcb639db9eccee632cc89df2876e27898ba3821c97c07a632

    • Size

      1.0MB

    • MD5

      c948e264d63ba010f6f903a1a97f1df1

    • SHA1

      efc5c87a2b9ef8a81bc8078d51555850da493dfd

    • SHA256

      dbc5b2c15536f01dcb639db9eccee632cc89df2876e27898ba3821c97c07a632

    • SHA512

      c1b0106dd91f9e12e531ebab0091a8561251b2f45252fd2309c2ea50a4d5b3d979a5d16e5acb8e6e593892f321c1850df3d6b1350420a3919cf24dee840d8e69

    • SSDEEP

      24576:byPQpwy8qFp6dgUqkZIoCHoBon5Z20O4y+Fc1fF0fw3b:OPQpwOudg2IZ/5py+FYF0O

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks