General

  • Target

    221e8df7ab9725ab321c84012c122c30d1e19bc975a670a5f383703dbab574b0

  • Size

    481KB

  • Sample

    241105-rqw8esserg

  • MD5

    15bd651c520dd6ac9aa700f035423875

  • SHA1

    47b67b478bb8f6417b368a7287e4c44aab8d9711

  • SHA256

    221e8df7ab9725ab321c84012c122c30d1e19bc975a670a5f383703dbab574b0

  • SHA512

    fea153d8ea596bd26126f4d172c0191cc1c2acd3e489191d6c1b0c80311ae801ad84f321d0b624325451408827036471c021b21accde8f58836067f6ecaed048

  • SSDEEP

    12288:sMr0y907jUSV8Bj83lBLPjd11AU5qSsdL63:wyojLQYjPjTWUUXL63

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      221e8df7ab9725ab321c84012c122c30d1e19bc975a670a5f383703dbab574b0

    • Size

      481KB

    • MD5

      15bd651c520dd6ac9aa700f035423875

    • SHA1

      47b67b478bb8f6417b368a7287e4c44aab8d9711

    • SHA256

      221e8df7ab9725ab321c84012c122c30d1e19bc975a670a5f383703dbab574b0

    • SHA512

      fea153d8ea596bd26126f4d172c0191cc1c2acd3e489191d6c1b0c80311ae801ad84f321d0b624325451408827036471c021b21accde8f58836067f6ecaed048

    • SSDEEP

      12288:sMr0y907jUSV8Bj83lBLPjd11AU5qSsdL63:wyojLQYjPjTWUUXL63

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks