General

  • Target

    6606748d966188073c4f0de4550df65ebdc01305f3a6aaed63b2ee9a8a997bb7

  • Size

    713KB

  • Sample

    241110-zz8xkswakd

  • MD5

    cc7dd8de5768dda873a6d1c91ffae4f8

  • SHA1

    afeec1580cff3d4af66a59ae8d651a0ff1f34508

  • SHA256

    6606748d966188073c4f0de4550df65ebdc01305f3a6aaed63b2ee9a8a997bb7

  • SHA512

    24b8adeb5ac78797ada559faccee4ded2d150421d6e224c2a5b88d018b3d8492f97ff6b648e21d5ca41bec6b56afcc28cb6f4831a71a089e28323ac3b62033ae

  • SSDEEP

    12288:fMr8y90iNnrGhXCRh7Q0vLpuX1Qm8D434w0IFg7LNzBK5TZHS:Dy7GhacUoHgfBwVZy

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      6606748d966188073c4f0de4550df65ebdc01305f3a6aaed63b2ee9a8a997bb7

    • Size

      713KB

    • MD5

      cc7dd8de5768dda873a6d1c91ffae4f8

    • SHA1

      afeec1580cff3d4af66a59ae8d651a0ff1f34508

    • SHA256

      6606748d966188073c4f0de4550df65ebdc01305f3a6aaed63b2ee9a8a997bb7

    • SHA512

      24b8adeb5ac78797ada559faccee4ded2d150421d6e224c2a5b88d018b3d8492f97ff6b648e21d5ca41bec6b56afcc28cb6f4831a71a089e28323ac3b62033ae

    • SSDEEP

      12288:fMr8y90iNnrGhXCRh7Q0vLpuX1Qm8D434w0IFg7LNzBK5TZHS:Dy7GhacUoHgfBwVZy

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks