General

  • Target

    152a1c2d22d734bc56bedc6e0862a21367aaa85d48984e182cdd5039dffa3ff7

  • Size

    482KB

  • Sample

    241106-nsk2dsymbw

  • MD5

    da4a14afbbb34a0ddc1d67b67f7f9de2

  • SHA1

    6583cc553c26d27f2f4a9bfd78c57b110a72302e

  • SHA256

    152a1c2d22d734bc56bedc6e0862a21367aaa85d48984e182cdd5039dffa3ff7

  • SHA512

    acd968aab811c9b43f96b56c1f5fdb4a2cfa4d09b1e530966a68d7407096b5add4360d29d50b727149b7733bc49b01af75df4b2ae64bdc50fb478aa1770ac653

  • SSDEEP

    12288:nMrcy90KwimzK60kri45l1lJhfX/C4qzECHGWrqJp/8wcL:Dy/BQK60b45hP6bzEycp/81L

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      152a1c2d22d734bc56bedc6e0862a21367aaa85d48984e182cdd5039dffa3ff7

    • Size

      482KB

    • MD5

      da4a14afbbb34a0ddc1d67b67f7f9de2

    • SHA1

      6583cc553c26d27f2f4a9bfd78c57b110a72302e

    • SHA256

      152a1c2d22d734bc56bedc6e0862a21367aaa85d48984e182cdd5039dffa3ff7

    • SHA512

      acd968aab811c9b43f96b56c1f5fdb4a2cfa4d09b1e530966a68d7407096b5add4360d29d50b727149b7733bc49b01af75df4b2ae64bdc50fb478aa1770ac653

    • SSDEEP

      12288:nMrcy90KwimzK60kri45l1lJhfX/C4qzECHGWrqJp/8wcL:Dy/BQK60b45hP6bzEycp/81L

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks