General

  • Target

    a762cf1fe9fa6cee5c309b7b981d2a87ad0498477c7d92d88d5ac61290fbbd96

  • Size

    481KB

  • Sample

    241105-mendxsymev

  • MD5

    7d16b79566ad8b891f016add07078949

  • SHA1

    1f654283b44ea8334e6005f31a50e4988e0b8691

  • SHA256

    a762cf1fe9fa6cee5c309b7b981d2a87ad0498477c7d92d88d5ac61290fbbd96

  • SHA512

    2d99eb44fe984799795dcb9a442f19b5aaa2f16f629c6ad78def357b6542c013069b225046c0b5583884643edfddc0c99b9757b63532052162f1e4b5c93faf84

  • SSDEEP

    6144:K5y+bnr+ep0yN90QES542owfVGIPv2YYmdIRJOiwoWOuGDMQM2c8HX/D5z9WSI6x:nMrqy90S/fVJvYWiJOiBuRQw8L5ZWSf

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      a762cf1fe9fa6cee5c309b7b981d2a87ad0498477c7d92d88d5ac61290fbbd96

    • Size

      481KB

    • MD5

      7d16b79566ad8b891f016add07078949

    • SHA1

      1f654283b44ea8334e6005f31a50e4988e0b8691

    • SHA256

      a762cf1fe9fa6cee5c309b7b981d2a87ad0498477c7d92d88d5ac61290fbbd96

    • SHA512

      2d99eb44fe984799795dcb9a442f19b5aaa2f16f629c6ad78def357b6542c013069b225046c0b5583884643edfddc0c99b9757b63532052162f1e4b5c93faf84

    • SSDEEP

      6144:K5y+bnr+ep0yN90QES542owfVGIPv2YYmdIRJOiwoWOuGDMQM2c8HX/D5z9WSI6x:nMrqy90S/fVJvYWiJOiBuRQw8L5ZWSf

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks