General

  • Target

    0c10cee4480de1f94dd19ca043f99fb1cfea1f10e35b551932cc436bf5ad8d61N.exe

  • Size

    560KB

  • Sample

    241118-s12rbsyrfz

  • MD5

    29a0faa2b2043832a3330fd8c7e2e020

  • SHA1

    b32a63524d279cbcefaba01b0c79c03b124dffa5

  • SHA256

    0c10cee4480de1f94dd19ca043f99fb1cfea1f10e35b551932cc436bf5ad8d61

  • SHA512

    ef858137d6730f8869171069e8fa34e12e650d1f15e6afd30a2bc78fd7382620a9bbe8b5ffd38b31ac042a2a0decaaa5a1d2b80d770cf6ea4e3c290da25103b5

  • SSDEEP

    12288:9MrMy900mUa4cON0WYtfXNe+EFpUJri/hnk0NNuDqd/:JyNa4cONkfXNLEcJqSW8DM

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Targets

    • Target

      0c10cee4480de1f94dd19ca043f99fb1cfea1f10e35b551932cc436bf5ad8d61N.exe

    • Size

      560KB

    • MD5

      29a0faa2b2043832a3330fd8c7e2e020

    • SHA1

      b32a63524d279cbcefaba01b0c79c03b124dffa5

    • SHA256

      0c10cee4480de1f94dd19ca043f99fb1cfea1f10e35b551932cc436bf5ad8d61

    • SHA512

      ef858137d6730f8869171069e8fa34e12e650d1f15e6afd30a2bc78fd7382620a9bbe8b5ffd38b31ac042a2a0decaaa5a1d2b80d770cf6ea4e3c290da25103b5

    • SSDEEP

      12288:9MrMy900mUa4cON0WYtfXNe+EFpUJri/hnk0NNuDqd/:JyNa4cONkfXNLEcJqSW8DM

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks