General

  • Target

    86f43ce3c0d9161461a5905621853f656c519786b8af76b50c87bc80a92cc08e.exe

  • Size

    699KB

  • Sample

    241120-bm6ppaxkdw

  • MD5

    24c567d522369fe2634dbf6af6fea285

  • SHA1

    4ca8081e07bb630cc2588be4ddec499d090213b2

  • SHA256

    86f43ce3c0d9161461a5905621853f656c519786b8af76b50c87bc80a92cc08e

  • SHA512

    0635f6de77ad47e365ea3e04a4e0dd40ce0a2f57302efabb35d0950676a064d9ad3bda4dd428e384594ecd014a87a0eebfd5d6922eb9b4d51f9444a511eb5fe1

  • SSDEEP

    12288:7MrLy90REEnSMPTnjPRjQRBkcrYSJ9syAxN01Yt+clI+Eyp1Jby/5nyk3w3Zq:cy5wD9sRZrtJ9PAxNb+cl1EgJy4lq

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Targets

    • Target

      86f43ce3c0d9161461a5905621853f656c519786b8af76b50c87bc80a92cc08e.exe

    • Size

      699KB

    • MD5

      24c567d522369fe2634dbf6af6fea285

    • SHA1

      4ca8081e07bb630cc2588be4ddec499d090213b2

    • SHA256

      86f43ce3c0d9161461a5905621853f656c519786b8af76b50c87bc80a92cc08e

    • SHA512

      0635f6de77ad47e365ea3e04a4e0dd40ce0a2f57302efabb35d0950676a064d9ad3bda4dd428e384594ecd014a87a0eebfd5d6922eb9b4d51f9444a511eb5fe1

    • SSDEEP

      12288:7MrLy90REEnSMPTnjPRjQRBkcrYSJ9syAxN01Yt+clI+Eyp1Jby/5nyk3w3Zq:cy5wD9sRZrtJ9PAxNb+cl1EgJy4lq

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks