General

  • Target

    def8f38a9052541909e5ff5e393a06fee8bb9338ba0561f3f4093fd468abca97

  • Size

    482KB

  • Sample

    241105-gyfwasxarj

  • MD5

    b422d9cafbc1b3a88302f8cffaf556d8

  • SHA1

    d68bd0c542c8f84cc1b7435c2a7fe1ba98c92f42

  • SHA256

    def8f38a9052541909e5ff5e393a06fee8bb9338ba0561f3f4093fd468abca97

  • SHA512

    e99542f8afcd53400b7e8ed0e6d31637984259c31b1597a96ad8d44371e6d191bca69b91fc5ca417e0a56194ad6e7ef81d98fea1bfd70ead1cc587d2a900863d

  • SSDEEP

    6144:KLy+bnr+Pp0yN90QENmVlaJPZOhim60kWz8N8mlepm7B4L7FUys7SeJ2fC3xxa50:BMrzy9074MJPHk82mlCmNYU94qhF

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      def8f38a9052541909e5ff5e393a06fee8bb9338ba0561f3f4093fd468abca97

    • Size

      482KB

    • MD5

      b422d9cafbc1b3a88302f8cffaf556d8

    • SHA1

      d68bd0c542c8f84cc1b7435c2a7fe1ba98c92f42

    • SHA256

      def8f38a9052541909e5ff5e393a06fee8bb9338ba0561f3f4093fd468abca97

    • SHA512

      e99542f8afcd53400b7e8ed0e6d31637984259c31b1597a96ad8d44371e6d191bca69b91fc5ca417e0a56194ad6e7ef81d98fea1bfd70ead1cc587d2a900863d

    • SSDEEP

      6144:KLy+bnr+Pp0yN90QENmVlaJPZOhim60kWz8N8mlepm7B4L7FUys7SeJ2fC3xxa50:BMrzy9074MJPHk82mlCmNYU94qhF

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks