General

  • Target

    be72591da8b84a54d4d7bd5091f3af858a3ce7715a04669d9d602ba3edf05f8b

  • Size

    478KB

  • Sample

    241105-w4yqmawcnd

  • MD5

    115021ec45f8ce5f38a93529a2b03982

  • SHA1

    fcb9f9a40c337aa0042337b771d22efa7d09dc17

  • SHA256

    be72591da8b84a54d4d7bd5091f3af858a3ce7715a04669d9d602ba3edf05f8b

  • SHA512

    6d2a57db2d7618b28b61e64ed2734ed89ad45d0d399667e5be2a814054c67f1a47e3705e860e462f9c9aa7b39af7ee4798e4768c0b104fae9430858e4f65f67c

  • SSDEEP

    12288:aMrCy90K6IJxnb0MOQ/7wmoJ2ZH+y2DnfL0YLe2xdh:MygIJxnAMljADHDfL0Pa

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      be72591da8b84a54d4d7bd5091f3af858a3ce7715a04669d9d602ba3edf05f8b

    • Size

      478KB

    • MD5

      115021ec45f8ce5f38a93529a2b03982

    • SHA1

      fcb9f9a40c337aa0042337b771d22efa7d09dc17

    • SHA256

      be72591da8b84a54d4d7bd5091f3af858a3ce7715a04669d9d602ba3edf05f8b

    • SHA512

      6d2a57db2d7618b28b61e64ed2734ed89ad45d0d399667e5be2a814054c67f1a47e3705e860e462f9c9aa7b39af7ee4798e4768c0b104fae9430858e4f65f67c

    • SSDEEP

      12288:aMrCy90K6IJxnb0MOQ/7wmoJ2ZH+y2DnfL0YLe2xdh:MygIJxnAMljADHDfL0Pa

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks