General

  • Target

    8041b4205b3454a2d1101ac954bd41e2bd4ff12590177bd0ebbe7bab6c39dc9f

  • Size

    470KB

  • Sample

    241105-y2mxfsxfka

  • MD5

    9da38838bc76e8d771ac4726f2129a34

  • SHA1

    891d201175bc6fe4bddff0cfbc2caf8d4fb9654d

  • SHA256

    8041b4205b3454a2d1101ac954bd41e2bd4ff12590177bd0ebbe7bab6c39dc9f

  • SHA512

    aa4074482b229aff6f3052e2ffbbaa655b195d7e14c74f34bff2bd26b67abad5a1a6cd4045dcb0c4f663c4df07f0bf10617c1ed8cc7030fbb69fe7d3bdfe8b02

  • SSDEEP

    12288:4Mrvy90IBKtUfldEtQHIHAgqiV73q1HD5ALhdB:Hy/K2fldRIHRqiVbqTAldB

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      8041b4205b3454a2d1101ac954bd41e2bd4ff12590177bd0ebbe7bab6c39dc9f

    • Size

      470KB

    • MD5

      9da38838bc76e8d771ac4726f2129a34

    • SHA1

      891d201175bc6fe4bddff0cfbc2caf8d4fb9654d

    • SHA256

      8041b4205b3454a2d1101ac954bd41e2bd4ff12590177bd0ebbe7bab6c39dc9f

    • SHA512

      aa4074482b229aff6f3052e2ffbbaa655b195d7e14c74f34bff2bd26b67abad5a1a6cd4045dcb0c4f663c4df07f0bf10617c1ed8cc7030fbb69fe7d3bdfe8b02

    • SSDEEP

      12288:4Mrvy90IBKtUfldEtQHIHAgqiV73q1HD5ALhdB:Hy/K2fldRIHRqiVbqTAldB

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks