General

  • Target

    d1f9e5235c3beabb86308f607fb7200fb37e6ca2372b856d930bad76921716c3

  • Size

    483KB

  • Sample

    241105-lcsp7azakk

  • MD5

    d5cb5f0d24aa30e5585e070a60254d22

  • SHA1

    05f6e52fe47929db31e19483df3f266b0e93f35a

  • SHA256

    d1f9e5235c3beabb86308f607fb7200fb37e6ca2372b856d930bad76921716c3

  • SHA512

    f5b04c35db7635555466a0c557829bf31a07cd584e1612090a9a50bf01fa4c7c800fb6d204c5056aaba80a4563fff86930bfaf1d7fae7160a10bbdad9abe4a91

  • SSDEEP

    6144:KVy+bnr+Sp0yN90QELsmdjKpACIbJ8WcbZHSEKtiXI44c/Xyh//YSyVFmULylQLQ:3MrWy90FxVMcEK5cieFmULylQLZZeZ

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      d1f9e5235c3beabb86308f607fb7200fb37e6ca2372b856d930bad76921716c3

    • Size

      483KB

    • MD5

      d5cb5f0d24aa30e5585e070a60254d22

    • SHA1

      05f6e52fe47929db31e19483df3f266b0e93f35a

    • SHA256

      d1f9e5235c3beabb86308f607fb7200fb37e6ca2372b856d930bad76921716c3

    • SHA512

      f5b04c35db7635555466a0c557829bf31a07cd584e1612090a9a50bf01fa4c7c800fb6d204c5056aaba80a4563fff86930bfaf1d7fae7160a10bbdad9abe4a91

    • SSDEEP

      6144:KVy+bnr+Sp0yN90QELsmdjKpACIbJ8WcbZHSEKtiXI44c/Xyh//YSyVFmULylQLQ:3MrWy90FxVMcEK5cieFmULylQLZZeZ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks