General

  • Target

    c701e548233276e1d79dd34c11db9f524a8d49cc3ef28bc89ce8fe121c6ce7f7

  • Size

    991KB

  • Sample

    241110-3rjt9s1jhk

  • MD5

    3b125db7ee4bc3964b69d3b2a70ffd2e

  • SHA1

    a9bad759683e6a678d3bf10511b0b31d2f699002

  • SHA256

    c701e548233276e1d79dd34c11db9f524a8d49cc3ef28bc89ce8fe121c6ce7f7

  • SHA512

    87b16935f42b180b62f59d8b7fe1d51226a10f3e413980372074221304f9d9ebc34e8fe143decb3e9967a718d16e9debccceb8c5ac797d6e3d2a7a9dadb66d0b

  • SSDEEP

    24576:8ysrnUwaJ2fkyv0kKfHIp7EpHzYr1ZOLYa:rsrnzac8yMkKQp7ATYr1Q8

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      c701e548233276e1d79dd34c11db9f524a8d49cc3ef28bc89ce8fe121c6ce7f7

    • Size

      991KB

    • MD5

      3b125db7ee4bc3964b69d3b2a70ffd2e

    • SHA1

      a9bad759683e6a678d3bf10511b0b31d2f699002

    • SHA256

      c701e548233276e1d79dd34c11db9f524a8d49cc3ef28bc89ce8fe121c6ce7f7

    • SHA512

      87b16935f42b180b62f59d8b7fe1d51226a10f3e413980372074221304f9d9ebc34e8fe143decb3e9967a718d16e9debccceb8c5ac797d6e3d2a7a9dadb66d0b

    • SSDEEP

      24576:8ysrnUwaJ2fkyv0kKfHIp7EpHzYr1ZOLYa:rsrnzac8yMkKQp7ATYr1Q8

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks