General

  • Target

    263d0d3f2cb132fd52d9a13fdbcb03b371bf5b495016ecc96726a5a0ed78eba2

  • Size

    478KB

  • Sample

    241105-xs9jeswfpd

  • MD5

    a39e354faa475771a5237266bb35ed12

  • SHA1

    b29a114741026ac1985a1c5d54c977ae963df84e

  • SHA256

    263d0d3f2cb132fd52d9a13fdbcb03b371bf5b495016ecc96726a5a0ed78eba2

  • SHA512

    a0e101fdd1f9b67573ca849a51e4f8aa0d2001c9c72c3f125477ffea0e5631cfebb1712b03a95572e0f4c9e7f37cb3f82894b03d2ffdaccbc61d854d234f8030

  • SSDEEP

    12288:uMrty90cJlVJGiI8Yq5WGO/RhdqLl2NDxOaQ:/y3PV0iI8J0tI+On

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      263d0d3f2cb132fd52d9a13fdbcb03b371bf5b495016ecc96726a5a0ed78eba2

    • Size

      478KB

    • MD5

      a39e354faa475771a5237266bb35ed12

    • SHA1

      b29a114741026ac1985a1c5d54c977ae963df84e

    • SHA256

      263d0d3f2cb132fd52d9a13fdbcb03b371bf5b495016ecc96726a5a0ed78eba2

    • SHA512

      a0e101fdd1f9b67573ca849a51e4f8aa0d2001c9c72c3f125477ffea0e5631cfebb1712b03a95572e0f4c9e7f37cb3f82894b03d2ffdaccbc61d854d234f8030

    • SSDEEP

      12288:uMrty90cJlVJGiI8Yq5WGO/RhdqLl2NDxOaQ:/y3PV0iI8J0tI+On

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks