General

  • Target

    81ce669b561bf3ab249e0f1c80b1c569df73986316306063c3dedc1048295194

  • Size

    481KB

  • Sample

    241030-1vj84asbla

  • MD5

    ee92f54b125c083d053d939f1e6ae679

  • SHA1

    6db419f201fd76968594e418e447ba404ca91f83

  • SHA256

    81ce669b561bf3ab249e0f1c80b1c569df73986316306063c3dedc1048295194

  • SHA512

    06bb588a6edef000230ad9e97058c0ee56cfd3288691b504760eb71c024570b3b2f8512c1bfb02a7681879d08a83ffa9eb26f8d0a1d91ca898c40ab0ff5081b1

  • SSDEEP

    12288:QMrty90l+EpyppcHErOC+91AUPqSsXNJUs0KZ:tyU+yypp4Err+9WUy9NmsFZ

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      81ce669b561bf3ab249e0f1c80b1c569df73986316306063c3dedc1048295194

    • Size

      481KB

    • MD5

      ee92f54b125c083d053d939f1e6ae679

    • SHA1

      6db419f201fd76968594e418e447ba404ca91f83

    • SHA256

      81ce669b561bf3ab249e0f1c80b1c569df73986316306063c3dedc1048295194

    • SHA512

      06bb588a6edef000230ad9e97058c0ee56cfd3288691b504760eb71c024570b3b2f8512c1bfb02a7681879d08a83ffa9eb26f8d0a1d91ca898c40ab0ff5081b1

    • SSDEEP

      12288:QMrty90l+EpyppcHErOC+91AUPqSsXNJUs0KZ:tyU+yypp4Err+9WUy9NmsFZ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks