General

  • Target

    58b550da5672b931a6dbe46befc52461f35e6e17af3061aa19b2c657b8851b9b

  • Size

    500KB

  • Sample

    241105-17f27szcmb

  • MD5

    1962f68a17e290e07c747a3bbb5f341f

  • SHA1

    be3604a70e9b72d44bf9ba2cb13c769ea06aed13

  • SHA256

    58b550da5672b931a6dbe46befc52461f35e6e17af3061aa19b2c657b8851b9b

  • SHA512

    f627c5eeaaea840237f5655ce3e8efce2cc68ed17ae454518c4622b7480e83c4ffd99b5b69bda25971594f074238183647fd722d2e0cc34931e4d51d79866f07

  • SSDEEP

    12288:5Mryy90AW6vDtV5bW5NL6lf2v+5/23prtWs0EqWaat:/yFW6vpV5qNmlf2vmO3lYs0EZt

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      58b550da5672b931a6dbe46befc52461f35e6e17af3061aa19b2c657b8851b9b

    • Size

      500KB

    • MD5

      1962f68a17e290e07c747a3bbb5f341f

    • SHA1

      be3604a70e9b72d44bf9ba2cb13c769ea06aed13

    • SHA256

      58b550da5672b931a6dbe46befc52461f35e6e17af3061aa19b2c657b8851b9b

    • SHA512

      f627c5eeaaea840237f5655ce3e8efce2cc68ed17ae454518c4622b7480e83c4ffd99b5b69bda25971594f074238183647fd722d2e0cc34931e4d51d79866f07

    • SSDEEP

      12288:5Mryy90AW6vDtV5bW5NL6lf2v+5/23prtWs0EqWaat:/yFW6vpV5qNmlf2vmO3lYs0EZt

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks