General

  • Target

    98d39414f451e8f1f1ad1b53ca16f95910493c76fd48061bb11bafd58ec6228e

  • Size

    478KB

  • Sample

    241105-evlk9stmfy

  • MD5

    6a35ca897a0119a199ed304e2111a0d0

  • SHA1

    5e3d2902a79308a246ec30a8f14b4d47ab7b713f

  • SHA256

    98d39414f451e8f1f1ad1b53ca16f95910493c76fd48061bb11bafd58ec6228e

  • SHA512

    b8f7924b6afe641e933bfadebd22393777895419f255d602ef5d81dc32eee8a51d5413b6214a6c38d8d97416dc201a2baf1c9c23638eaa97805aecfdaea38d9f

  • SSDEEP

    12288:/Mr0y90Cq+iolXdDnbOGO/RhdrLe2NY+6bg:vyXq9olNb2t/q+6M

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      98d39414f451e8f1f1ad1b53ca16f95910493c76fd48061bb11bafd58ec6228e

    • Size

      478KB

    • MD5

      6a35ca897a0119a199ed304e2111a0d0

    • SHA1

      5e3d2902a79308a246ec30a8f14b4d47ab7b713f

    • SHA256

      98d39414f451e8f1f1ad1b53ca16f95910493c76fd48061bb11bafd58ec6228e

    • SHA512

      b8f7924b6afe641e933bfadebd22393777895419f255d602ef5d81dc32eee8a51d5413b6214a6c38d8d97416dc201a2baf1c9c23638eaa97805aecfdaea38d9f

    • SSDEEP

      12288:/Mr0y90Cq+iolXdDnbOGO/RhdrLe2NY+6bg:vyXq9olNb2t/q+6M

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks