General

  • Target

    44986594d51912b131cc7531588fb864e58ec39c9b9a277696bc8f28c2b85fc6

  • Size

    483KB

  • Sample

    241105-rj5afsseja

  • MD5

    34f85280ad404b569ebbfe206a676bf1

  • SHA1

    402dc5de431765ced1f49ea28a42a517410092b6

  • SHA256

    44986594d51912b131cc7531588fb864e58ec39c9b9a277696bc8f28c2b85fc6

  • SHA512

    f160edeb0a3816c2e8232da45df60e8e31c914712f8ce2cb1afda735a438a7bfcfd20004e0334094afe1a7e73556848f4ceda5c50144ac14f14f669ecc2da1e0

  • SSDEEP

    12288:NMr0y90rnPwyVnlxZTGuExT1uGVMZuzYsAta6C0b13:FysjVlxZPw1uDZuzm

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      44986594d51912b131cc7531588fb864e58ec39c9b9a277696bc8f28c2b85fc6

    • Size

      483KB

    • MD5

      34f85280ad404b569ebbfe206a676bf1

    • SHA1

      402dc5de431765ced1f49ea28a42a517410092b6

    • SHA256

      44986594d51912b131cc7531588fb864e58ec39c9b9a277696bc8f28c2b85fc6

    • SHA512

      f160edeb0a3816c2e8232da45df60e8e31c914712f8ce2cb1afda735a438a7bfcfd20004e0334094afe1a7e73556848f4ceda5c50144ac14f14f669ecc2da1e0

    • SSDEEP

      12288:NMr0y90rnPwyVnlxZTGuExT1uGVMZuzYsAta6C0b13:FysjVlxZPw1uDZuzm

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks