General

  • Target

    94254fac3fa196ca94bc987a67a40c2ee362d54e61fffaf06be600a8ad6525bf

  • Size

    483KB

  • Sample

    241106-tvsf5stcpc

  • MD5

    fab852c2b1994e7910c4bf09266a34a7

  • SHA1

    31235e485b15c723a9814635d436d1d3c9f62a56

  • SHA256

    94254fac3fa196ca94bc987a67a40c2ee362d54e61fffaf06be600a8ad6525bf

  • SHA512

    80c2dc438d121ff3fa0c1c6f2433a575d64355b9edd3fd52b318219f0b79d53f59dd5f5ab6e1fddbd110d78d199a646f25ea87f16fa4ddec0e73e2cf3f4a5b9f

  • SSDEEP

    12288:2Mr8y90UFNVUc3u2iSfC7ps7MAw5n1S4wI3RBXi4m:2yRV93u2da7pDAw5n1/r3RB0

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      94254fac3fa196ca94bc987a67a40c2ee362d54e61fffaf06be600a8ad6525bf

    • Size

      483KB

    • MD5

      fab852c2b1994e7910c4bf09266a34a7

    • SHA1

      31235e485b15c723a9814635d436d1d3c9f62a56

    • SHA256

      94254fac3fa196ca94bc987a67a40c2ee362d54e61fffaf06be600a8ad6525bf

    • SHA512

      80c2dc438d121ff3fa0c1c6f2433a575d64355b9edd3fd52b318219f0b79d53f59dd5f5ab6e1fddbd110d78d199a646f25ea87f16fa4ddec0e73e2cf3f4a5b9f

    • SSDEEP

      12288:2Mr8y90UFNVUc3u2iSfC7ps7MAw5n1S4wI3RBXi4m:2yRV93u2da7pDAw5n1/r3RB0

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks