General

  • Target

    38e4e04b31c0bf0cb6e9596e20ec93f98d0c33d1eb5e35a1a67455c64f055292

  • Size

    724KB

  • Sample

    241106-3khnmazjgv

  • MD5

    d7cb04121be8f436a9412d365d9637d1

  • SHA1

    edac61453cf6db08f0e0c727590da668e0dd65b1

  • SHA256

    38e4e04b31c0bf0cb6e9596e20ec93f98d0c33d1eb5e35a1a67455c64f055292

  • SHA512

    a8bc7d0f005000b5b08894825d5be3f58ac29ac705a6fee7432d6dd9fe38d9e39c8f56ed64117123eba21adeeb77e1eb7c97eeb50dea1ac1ff84e22ceccb154f

  • SSDEEP

    12288:PMrpy90+7NE6xViszNWuoxD2MVMIeeGscwiLAP/kCjWcGVInA8aW+A8OQODqXf1R:ayz7DV9zNxGDfVMBeGsvWA0CS1CMCJWf

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      38e4e04b31c0bf0cb6e9596e20ec93f98d0c33d1eb5e35a1a67455c64f055292

    • Size

      724KB

    • MD5

      d7cb04121be8f436a9412d365d9637d1

    • SHA1

      edac61453cf6db08f0e0c727590da668e0dd65b1

    • SHA256

      38e4e04b31c0bf0cb6e9596e20ec93f98d0c33d1eb5e35a1a67455c64f055292

    • SHA512

      a8bc7d0f005000b5b08894825d5be3f58ac29ac705a6fee7432d6dd9fe38d9e39c8f56ed64117123eba21adeeb77e1eb7c97eeb50dea1ac1ff84e22ceccb154f

    • SSDEEP

      12288:PMrpy90+7NE6xViszNWuoxD2MVMIeeGscwiLAP/kCjWcGVInA8aW+A8OQODqXf1R:ayz7DV9zNxGDfVMBeGsvWA0CS1CMCJWf

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks