General

  • Target

    3619a1071d1dc9537f8fb23fa6b10439db17ba3329da4375949a3205bffd08b4.exe

  • Size

    560KB

  • Sample

    241119-eakhgazcje

  • MD5

    7831376d23f7a1f997db81325bf4dab0

  • SHA1

    2c993c8b8ccb78bb468d74c1ddcca0d10700468d

  • SHA256

    3619a1071d1dc9537f8fb23fa6b10439db17ba3329da4375949a3205bffd08b4

  • SHA512

    1243cfcc35be538753f95cddfcd373025fcda3a38cd83b2ca4bbb6be4cf5ce85fa1ff0a95574953fa4be101283b1322e58fab90ac3a1ab27cf0d81c78c2c8fb0

  • SSDEEP

    12288:9MrMy900mUa4cON0WYtfXNe+EFpUJri/hnk0NNuDqd/H:JyNa4cONkfXNLEcJqSW8DMH

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Targets

    • Target

      3619a1071d1dc9537f8fb23fa6b10439db17ba3329da4375949a3205bffd08b4.exe

    • Size

      560KB

    • MD5

      7831376d23f7a1f997db81325bf4dab0

    • SHA1

      2c993c8b8ccb78bb468d74c1ddcca0d10700468d

    • SHA256

      3619a1071d1dc9537f8fb23fa6b10439db17ba3329da4375949a3205bffd08b4

    • SHA512

      1243cfcc35be538753f95cddfcd373025fcda3a38cd83b2ca4bbb6be4cf5ce85fa1ff0a95574953fa4be101283b1322e58fab90ac3a1ab27cf0d81c78c2c8fb0

    • SSDEEP

      12288:9MrMy900mUa4cON0WYtfXNe+EFpUJri/hnk0NNuDqd/H:JyNa4cONkfXNLEcJqSW8DMH

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks