General

  • Target

    cdae313f52638611722b783ec4ded72ebd1b0a5bb0806626052f5ca269586f22

  • Size

    481KB

  • Sample

    241104-2t6alsylbs

  • MD5

    751036c56c49e2d0a7d41be3655a9e17

  • SHA1

    e4e4c41fab35817630bb565d9be363fb44f5ee9b

  • SHA256

    cdae313f52638611722b783ec4ded72ebd1b0a5bb0806626052f5ca269586f22

  • SHA512

    cb92ce95a063a05800a82d97a3694a3df0974ad2520e399955941a52f6accd1dd71d68bc8ff6724322163761e0daa2279264633762e4c130bc6642dedf9cce32

  • SSDEEP

    6144:K9y+bnr+Qp0yN90QExVgTtAOFSsi18z3EDlAEn4yz//thhdFoz+zizNQuhqClCgL:/Mr4y90xkAmSB8z0RAE4yz9vi2C7+Uj

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      cdae313f52638611722b783ec4ded72ebd1b0a5bb0806626052f5ca269586f22

    • Size

      481KB

    • MD5

      751036c56c49e2d0a7d41be3655a9e17

    • SHA1

      e4e4c41fab35817630bb565d9be363fb44f5ee9b

    • SHA256

      cdae313f52638611722b783ec4ded72ebd1b0a5bb0806626052f5ca269586f22

    • SHA512

      cb92ce95a063a05800a82d97a3694a3df0974ad2520e399955941a52f6accd1dd71d68bc8ff6724322163761e0daa2279264633762e4c130bc6642dedf9cce32

    • SSDEEP

      6144:K9y+bnr+Qp0yN90QExVgTtAOFSsi18z3EDlAEn4yz//thhdFoz+zizNQuhqClCgL:/Mr4y90xkAmSB8z0RAE4yz9vi2C7+Uj

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks