General

  • Target

    28c1534cf54e961e4de6d8f9688b0e5586a8b1ac9465933552a9f0a458c6f339

  • Size

    483KB

  • Sample

    241105-a932mszqcw

  • MD5

    10d32fc9e3b9bdc04b4e64bb9a8da0ff

  • SHA1

    96d6844e392eaa573988eb09c25cd7a8e51b9e6d

  • SHA256

    28c1534cf54e961e4de6d8f9688b0e5586a8b1ac9465933552a9f0a458c6f339

  • SHA512

    271c626ce1bf8d1b414d0c187fe158c9011b17300d7296f8f723ad5fba2fe90847a1618e5b48bce8c515809f5497a0278fb35ec4aec7dfaad9b7a31835d76025

  • SSDEEP

    12288:aMrIy9081pJ1XrmKEpqeSCHXTugSaUagm40ykli:+yrLvrbEkgXTfVUaD40yyi

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      28c1534cf54e961e4de6d8f9688b0e5586a8b1ac9465933552a9f0a458c6f339

    • Size

      483KB

    • MD5

      10d32fc9e3b9bdc04b4e64bb9a8da0ff

    • SHA1

      96d6844e392eaa573988eb09c25cd7a8e51b9e6d

    • SHA256

      28c1534cf54e961e4de6d8f9688b0e5586a8b1ac9465933552a9f0a458c6f339

    • SHA512

      271c626ce1bf8d1b414d0c187fe158c9011b17300d7296f8f723ad5fba2fe90847a1618e5b48bce8c515809f5497a0278fb35ec4aec7dfaad9b7a31835d76025

    • SSDEEP

      12288:aMrIy9081pJ1XrmKEpqeSCHXTugSaUagm40ykli:+yrLvrbEkgXTfVUaD40yyi

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks