General

  • Target

    b697632bd28d8e08f9523ac9d6499749ff419595f12efc8c8258cdf311687e78

  • Size

    670KB

  • Sample

    241108-rf6n4swmbn

  • MD5

    e29d6d63392ac47549a1b5b77c0a3c65

  • SHA1

    06202f8ca735ac9049a2e1a123979bf3f92c64b1

  • SHA256

    b697632bd28d8e08f9523ac9d6499749ff419595f12efc8c8258cdf311687e78

  • SHA512

    90ebb7d5a012668ce5905136e4cfcd5d365ca044a69341543301c643b861c92787704020414245bbf0a822355f5d47d3b1d7d42693acca38d3de449e29c7dbc5

  • SSDEEP

    12288:XMrqy90+D3gjCdbzmC81rrUhM5vOuaizPsVGadyGQ:5yxD3fnmihM5vOuai6Ga0GQ

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      b697632bd28d8e08f9523ac9d6499749ff419595f12efc8c8258cdf311687e78

    • Size

      670KB

    • MD5

      e29d6d63392ac47549a1b5b77c0a3c65

    • SHA1

      06202f8ca735ac9049a2e1a123979bf3f92c64b1

    • SHA256

      b697632bd28d8e08f9523ac9d6499749ff419595f12efc8c8258cdf311687e78

    • SHA512

      90ebb7d5a012668ce5905136e4cfcd5d365ca044a69341543301c643b861c92787704020414245bbf0a822355f5d47d3b1d7d42693acca38d3de449e29c7dbc5

    • SSDEEP

      12288:XMrqy90+D3gjCdbzmC81rrUhM5vOuaizPsVGadyGQ:5yxD3fnmihM5vOuai6Ga0GQ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks