General

  • Target

    43853ae9953b7d63c06b0653cee404f9aa23f42a0b0f3f7101e0913648c0ce6b

  • Size

    499KB

  • Sample

    241105-vy3lysvfja

  • MD5

    d9d24ac0f73126b63ec6535e715a0db4

  • SHA1

    5639f5001e819bba869691c69dec12d320a085d4

  • SHA256

    43853ae9953b7d63c06b0653cee404f9aa23f42a0b0f3f7101e0913648c0ce6b

  • SHA512

    fd2c971d1e8a596da1ccea176d40e24184e70a6a5f4d601a3779a7df2cbaeba75ba5ebdb77ea0f1cbb807f8e53ac429e08b6aa9899a0e44a19c4f219f16e2460

  • SSDEEP

    12288:OMrCy905Q/feRJIAD8dUIhvvSzJxIf+h:oyZ/febSUIhHSzJi2h

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      43853ae9953b7d63c06b0653cee404f9aa23f42a0b0f3f7101e0913648c0ce6b

    • Size

      499KB

    • MD5

      d9d24ac0f73126b63ec6535e715a0db4

    • SHA1

      5639f5001e819bba869691c69dec12d320a085d4

    • SHA256

      43853ae9953b7d63c06b0653cee404f9aa23f42a0b0f3f7101e0913648c0ce6b

    • SHA512

      fd2c971d1e8a596da1ccea176d40e24184e70a6a5f4d601a3779a7df2cbaeba75ba5ebdb77ea0f1cbb807f8e53ac429e08b6aa9899a0e44a19c4f219f16e2460

    • SSDEEP

      12288:OMrCy905Q/feRJIAD8dUIhvvSzJxIf+h:oyZ/febSUIhHSzJi2h

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks