General

  • Target

    deb2a5f7c2f5be85bbd479a2b1360e7bfd016bbb89601d79ae9612f450f436e0.exe

  • Size

    801KB

  • Sample

    241126-x3zf7ssjeq

  • MD5

    d5b9b093f42bc4d00efc7eb8bc5ba089

  • SHA1

    597b0797ba6e3e817cff79ff7b10b8bfae61b856

  • SHA256

    deb2a5f7c2f5be85bbd479a2b1360e7bfd016bbb89601d79ae9612f450f436e0

  • SHA512

    9039d633b1335c13429c31133e4e88acbb4953dc92006ff03c90a72555d6cc376d0239ff628062357b911bb544c55bf7e1ac391872e5db7a0b605c374d5e833b

  • SSDEEP

    24576:tyL1IDRcTWwx3lZ+U7Qo8Bpn9PeN4KX7D:IpIDWNxVcQ8HnNeNn

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Targets

    • Target

      deb2a5f7c2f5be85bbd479a2b1360e7bfd016bbb89601d79ae9612f450f436e0.exe

    • Size

      801KB

    • MD5

      d5b9b093f42bc4d00efc7eb8bc5ba089

    • SHA1

      597b0797ba6e3e817cff79ff7b10b8bfae61b856

    • SHA256

      deb2a5f7c2f5be85bbd479a2b1360e7bfd016bbb89601d79ae9612f450f436e0

    • SHA512

      9039d633b1335c13429c31133e4e88acbb4953dc92006ff03c90a72555d6cc376d0239ff628062357b911bb544c55bf7e1ac391872e5db7a0b605c374d5e833b

    • SSDEEP

      24576:tyL1IDRcTWwx3lZ+U7Qo8Bpn9PeN4KX7D:IpIDWNxVcQ8HnNeNn

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks