General

  • Target

    5b288eaecfd4f3bfb7f8841f6e2cb2eb137c29a5b70aa0beef0ed9dccfa537cc

  • Size

    482KB

  • Sample

    241105-aptx8szlgx

  • MD5

    6442853344763cc2a525443ab762aaaa

  • SHA1

    b07ba65457fb4e7de38c50f5ff40119b56f31227

  • SHA256

    5b288eaecfd4f3bfb7f8841f6e2cb2eb137c29a5b70aa0beef0ed9dccfa537cc

  • SHA512

    1f7b6e9be73527216915bb9e77269e46c8ff0cf92c9d917e456de0254a4bd7953c3a03965cea712c3d7c0f616e6196dfbab920b69d8ae9670f5c49889fdee004

  • SSDEEP

    12288:iMrzy90STphT79TDQKaUzp9pec1rPaG7SZp3S15oR:dyXTt7aKprecQ3mToR

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      5b288eaecfd4f3bfb7f8841f6e2cb2eb137c29a5b70aa0beef0ed9dccfa537cc

    • Size

      482KB

    • MD5

      6442853344763cc2a525443ab762aaaa

    • SHA1

      b07ba65457fb4e7de38c50f5ff40119b56f31227

    • SHA256

      5b288eaecfd4f3bfb7f8841f6e2cb2eb137c29a5b70aa0beef0ed9dccfa537cc

    • SHA512

      1f7b6e9be73527216915bb9e77269e46c8ff0cf92c9d917e456de0254a4bd7953c3a03965cea712c3d7c0f616e6196dfbab920b69d8ae9670f5c49889fdee004

    • SSDEEP

      12288:iMrzy90STphT79TDQKaUzp9pec1rPaG7SZp3S15oR:dyXTt7aKprecQ3mToR

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks