General

  • Target

    689f00dd78db86531bde2a4be89b313402c5fb093fd54444b306c14306de0322

  • Size

    482KB

  • Sample

    241105-gsljlavqfs

  • MD5

    369e4c5ea3554a047f11645639498987

  • SHA1

    ca741011023202eda734baa9aa680dba24f2c84a

  • SHA256

    689f00dd78db86531bde2a4be89b313402c5fb093fd54444b306c14306de0322

  • SHA512

    ecad3db535b1125ce1bf441a3ec0430807c34aea292251aa276fa852d35269ce18f9fadecca1be93a8c6529c10e173ef210e7180487660d9d3f524f951675130

  • SSDEEP

    12288:JMriy90NZfOdE7tmWyzxp7Kjd8kUtDQKaUbp9pec1rPat79VJC:nyVs7ylpOjd8kg7aUprecQ/i

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      689f00dd78db86531bde2a4be89b313402c5fb093fd54444b306c14306de0322

    • Size

      482KB

    • MD5

      369e4c5ea3554a047f11645639498987

    • SHA1

      ca741011023202eda734baa9aa680dba24f2c84a

    • SHA256

      689f00dd78db86531bde2a4be89b313402c5fb093fd54444b306c14306de0322

    • SHA512

      ecad3db535b1125ce1bf441a3ec0430807c34aea292251aa276fa852d35269ce18f9fadecca1be93a8c6529c10e173ef210e7180487660d9d3f524f951675130

    • SSDEEP

      12288:JMriy90NZfOdE7tmWyzxp7Kjd8kUtDQKaUbp9pec1rPat79VJC:nyVs7ylpOjd8kg7aUprecQ/i

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks