General

  • Target

    f1ea8300f8dba4042b466efd8a5f7fdec0d99d1bf579813a2e8c5399c113ccee

  • Size

    1.1MB

  • Sample

    241110-3haj8sxfqd

  • MD5

    d3e92a6125d71c99e45e06eedc1e4cab

  • SHA1

    5806496783264cd86277661146fc2dff4faa1e06

  • SHA256

    f1ea8300f8dba4042b466efd8a5f7fdec0d99d1bf579813a2e8c5399c113ccee

  • SHA512

    437b49174bfbea21e8d3839f88c49b2c91ab5fecf97f1c8fc146263790ba427111940e2a43ad338866049450983059dd0a2dcc67077497f66409ab3df54b4c60

  • SSDEEP

    24576:KyTiV9kvaOayudOw0okLnZHfv8a/f/x29LFJpQEVoglk:RTY9kpayuMf7ZH38aJ2zno

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Targets

    • Target

      f1ea8300f8dba4042b466efd8a5f7fdec0d99d1bf579813a2e8c5399c113ccee

    • Size

      1.1MB

    • MD5

      d3e92a6125d71c99e45e06eedc1e4cab

    • SHA1

      5806496783264cd86277661146fc2dff4faa1e06

    • SHA256

      f1ea8300f8dba4042b466efd8a5f7fdec0d99d1bf579813a2e8c5399c113ccee

    • SHA512

      437b49174bfbea21e8d3839f88c49b2c91ab5fecf97f1c8fc146263790ba427111940e2a43ad338866049450983059dd0a2dcc67077497f66409ab3df54b4c60

    • SSDEEP

      24576:KyTiV9kvaOayudOw0okLnZHfv8a/f/x29LFJpQEVoglk:RTY9kpayuMf7ZH38aJ2zno

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks