General

  • Target

    205e77ff9406f3f51f7549d5e3575895f882bfd1c6bd15920f6e33419ce9db9c

  • Size

    1.1MB

  • Sample

    241108-wczhvawhmj

  • MD5

    27aaf21e965b0839487460b09735c4ba

  • SHA1

    8c43cb4df8e761f711e53fa367f33c027794aa1f

  • SHA256

    205e77ff9406f3f51f7549d5e3575895f882bfd1c6bd15920f6e33419ce9db9c

  • SHA512

    6a4a33fa5d102c9da60cf2b22dce0e1505b8f2100ae3ed5bea0b22779afd1bdc5287a6056368aad29bf6dcdb89c8c647a7dbcef3cd6d8c50f9ad3fb86483231a

  • SSDEEP

    24576:CypwFbixRJEVzX/mmpUpvw7L6eI6trrzp9e6pjv4EOulVsjeUWIaOU:pqkJIzX/TapvwL6entrrzpA67fsjpa

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      205e77ff9406f3f51f7549d5e3575895f882bfd1c6bd15920f6e33419ce9db9c

    • Size

      1.1MB

    • MD5

      27aaf21e965b0839487460b09735c4ba

    • SHA1

      8c43cb4df8e761f711e53fa367f33c027794aa1f

    • SHA256

      205e77ff9406f3f51f7549d5e3575895f882bfd1c6bd15920f6e33419ce9db9c

    • SHA512

      6a4a33fa5d102c9da60cf2b22dce0e1505b8f2100ae3ed5bea0b22779afd1bdc5287a6056368aad29bf6dcdb89c8c647a7dbcef3cd6d8c50f9ad3fb86483231a

    • SSDEEP

      24576:CypwFbixRJEVzX/mmpUpvw7L6eI6trrzp9e6pjv4EOulVsjeUWIaOU:pqkJIzX/TapvwL6entrrzpA67fsjpa

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks