General

  • Target

    571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be

  • Size

    810KB

  • Sample

    241108-x412esxhna

  • MD5

    a7e1c85f26d29873662fb34290253def

  • SHA1

    ff40bebd990162a5b1b679527a8f2755415b70d4

  • SHA256

    571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be

  • SHA512

    30cfbb9d57a6076f89ddab44bb3f6169a43418b16612571773c532aae090c59bbff6684acb64e15ee393f4f38b07c7464d109bcf0ae59c085a3bd6d8c133e8dc

  • SSDEEP

    12288:MMroy90W2MhF573fibSWEVpF/ZMBxk2EULe11d8ejhtYjAdqcEaJpkgt9s:8yj2MhF5MDnkSerdzjkSXJygt9s

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be

    • Size

      810KB

    • MD5

      a7e1c85f26d29873662fb34290253def

    • SHA1

      ff40bebd990162a5b1b679527a8f2755415b70d4

    • SHA256

      571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be

    • SHA512

      30cfbb9d57a6076f89ddab44bb3f6169a43418b16612571773c532aae090c59bbff6684acb64e15ee393f4f38b07c7464d109bcf0ae59c085a3bd6d8c133e8dc

    • SSDEEP

      12288:MMroy90W2MhF573fibSWEVpF/ZMBxk2EULe11d8ejhtYjAdqcEaJpkgt9s:8yj2MhF5MDnkSerdzjkSXJygt9s

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks