General

  • Target

    e78e1238a199451a67c12f4c7ab51d13d3a059a06551e03a866f48f3d3e4a7e1

  • Size

    470KB

  • Sample

    241107-dbjf5athpq

  • MD5

    a8e9cd09597f7c1d79485c2bc72ed031

  • SHA1

    421603709b0460dea5ac3f49c7842cc8848be715

  • SHA256

    e78e1238a199451a67c12f4c7ab51d13d3a059a06551e03a866f48f3d3e4a7e1

  • SHA512

    bd7bd1b84535e5d94f9690abf76d24f99decd6e32ac6f93e385477ad7d048c9893b1b7a8d37c98ec3c909aa8e63a7f04d34d6a44bff30eaefad1fb42aa98f78d

  • SSDEEP

    12288:PMrVy90HK6Ao9ZNrR6ihDU8GBjHyNbSlWul+VwjUoAZ:+yOZNR6+cHl5+VOUoY

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      e78e1238a199451a67c12f4c7ab51d13d3a059a06551e03a866f48f3d3e4a7e1

    • Size

      470KB

    • MD5

      a8e9cd09597f7c1d79485c2bc72ed031

    • SHA1

      421603709b0460dea5ac3f49c7842cc8848be715

    • SHA256

      e78e1238a199451a67c12f4c7ab51d13d3a059a06551e03a866f48f3d3e4a7e1

    • SHA512

      bd7bd1b84535e5d94f9690abf76d24f99decd6e32ac6f93e385477ad7d048c9893b1b7a8d37c98ec3c909aa8e63a7f04d34d6a44bff30eaefad1fb42aa98f78d

    • SSDEEP

      12288:PMrVy90HK6Ao9ZNrR6ihDU8GBjHyNbSlWul+VwjUoAZ:+yOZNR6+cHl5+VOUoY

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks