General

  • Target

    31bf9990ccd5bd913f5135979b680a9355137225c7e052216a00f5d5dd77fdc5

  • Size

    500KB

  • Sample

    241105-yyernsxele

  • MD5

    584603031148769c9a7d910a05427b86

  • SHA1

    7c99cb0574a7c26cb340936ebcbfd846dc57c324

  • SHA256

    31bf9990ccd5bd913f5135979b680a9355137225c7e052216a00f5d5dd77fdc5

  • SHA512

    fb1f49aafe7f645200fdce8fa00950ac074a628ecb22eccf786005a750de928e6c04f20e7a1a2562043601738683f687bc5f6f8ef5ffd6680c68cc90dbcc1ed9

  • SSDEEP

    6144:Key+bnr+Mp0yN90QElWQCKUFiU52q8FMFvhDX/2PJprb88gTSWhNIVrD00ZcxGcw:iMrcy90/3CKUoi4o5/2hpr7Www8c4d

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      31bf9990ccd5bd913f5135979b680a9355137225c7e052216a00f5d5dd77fdc5

    • Size

      500KB

    • MD5

      584603031148769c9a7d910a05427b86

    • SHA1

      7c99cb0574a7c26cb340936ebcbfd846dc57c324

    • SHA256

      31bf9990ccd5bd913f5135979b680a9355137225c7e052216a00f5d5dd77fdc5

    • SHA512

      fb1f49aafe7f645200fdce8fa00950ac074a628ecb22eccf786005a750de928e6c04f20e7a1a2562043601738683f687bc5f6f8ef5ffd6680c68cc90dbcc1ed9

    • SSDEEP

      6144:Key+bnr+Mp0yN90QElWQCKUFiU52q8FMFvhDX/2PJprb88gTSWhNIVrD00ZcxGcw:iMrcy90/3CKUoi4o5/2hpr7Www8c4d

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks