General

  • Target

    46aa4c01b47b295524c173af0fc828cb84323476871d0e3c9e3d5b2ea59ef1c2.exe

  • Size

    722KB

  • Sample

    250208-dedeaa1mcw

  • MD5

    bf09b97283810024e3bfbf80f56dea4e

  • SHA1

    e4fca0b66196a4b7f4e0b1b3c818a90cf7d2b0fc

  • SHA256

    46aa4c01b47b295524c173af0fc828cb84323476871d0e3c9e3d5b2ea59ef1c2

  • SHA512

    70336a4099888363f5b5ed1533aa6eb962414e936ce4e9d27a4383eede7ca7bb5748094f5d8d31ec74c99ca094b1ea21e1739d61c22216ccffd6f212e6437cd8

  • SSDEEP

    12288:gMrhy90Q0pF8uDY9FPrSo31Ffh9PfZn0+LvnXjym8+bFVgApsb6eexkVo:Ryma9lP3JhfZ0u7ym8+bIzWeMkVo

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Targets

    • Target

      46aa4c01b47b295524c173af0fc828cb84323476871d0e3c9e3d5b2ea59ef1c2.exe

    • Size

      722KB

    • MD5

      bf09b97283810024e3bfbf80f56dea4e

    • SHA1

      e4fca0b66196a4b7f4e0b1b3c818a90cf7d2b0fc

    • SHA256

      46aa4c01b47b295524c173af0fc828cb84323476871d0e3c9e3d5b2ea59ef1c2

    • SHA512

      70336a4099888363f5b5ed1533aa6eb962414e936ce4e9d27a4383eede7ca7bb5748094f5d8d31ec74c99ca094b1ea21e1739d61c22216ccffd6f212e6437cd8

    • SSDEEP

      12288:gMrhy90Q0pF8uDY9FPrSo31Ffh9PfZn0+LvnXjym8+bFVgApsb6eexkVo:Ryma9lP3JhfZ0u7ym8+bIzWeMkVo

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender TamperProtection settings

    • Modifies Windows Defender notification settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks