General

  • Target

    ea5483b9cb8d90ab4ceb5b8fe2cc517334e720b1b5b2af00788094cde601acc4

  • Size

    712KB

  • Sample

    241108-xskv3axjaz

  • MD5

    817de002ff06c2d1c701d639b20f687b

  • SHA1

    161b5741927e43c56a92d849e3a877de059c223d

  • SHA256

    ea5483b9cb8d90ab4ceb5b8fe2cc517334e720b1b5b2af00788094cde601acc4

  • SHA512

    761f25dc93e0b0531a3e8d0502e0126018747ce8b79270c698df7ebcfdf042a58a26113a46dbd5fb0f54c320efcfd91c58fd0876afd1a628e04e5e6cc485253b

  • SSDEEP

    12288:cMrXy90yK8x0h6x45uN7CwWQUi6CZNdrePHWOYTH3kUGC//bBu:by/1x00X7DWQh6CZPKPHWzH3k2//du

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      ea5483b9cb8d90ab4ceb5b8fe2cc517334e720b1b5b2af00788094cde601acc4

    • Size

      712KB

    • MD5

      817de002ff06c2d1c701d639b20f687b

    • SHA1

      161b5741927e43c56a92d849e3a877de059c223d

    • SHA256

      ea5483b9cb8d90ab4ceb5b8fe2cc517334e720b1b5b2af00788094cde601acc4

    • SHA512

      761f25dc93e0b0531a3e8d0502e0126018747ce8b79270c698df7ebcfdf042a58a26113a46dbd5fb0f54c320efcfd91c58fd0876afd1a628e04e5e6cc485253b

    • SSDEEP

      12288:cMrXy90yK8x0h6x45uN7CwWQUi6CZNdrePHWOYTH3kUGC//bBu:by/1x00X7DWQh6CZPKPHWzH3k2//du

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks