General

  • Target

    5ae9cf456f352afc3d7f513bbe478ad281a37ea7a55a7b92dde41dd519e1c1fc

  • Size

    481KB

  • Sample

    241107-efjhcsxmaj

  • MD5

    492ac502625ece193958390e60ae7899

  • SHA1

    9271d015a0e045bc86f17216b6cb5a0cc299e222

  • SHA256

    5ae9cf456f352afc3d7f513bbe478ad281a37ea7a55a7b92dde41dd519e1c1fc

  • SHA512

    0347623af144de04608da82048c23dbadaba31d6bd85ab5798ab3ed35747ea5a4c0abbfd273de753a7f499c95891ccd97fcd7f9a6484a784c0a13393a54f266b

  • SSDEEP

    12288:NMrRy90FZCXPObJjLv5jgKCSNjuNsusOBGN:EyeZuP0JRwSNKE

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      5ae9cf456f352afc3d7f513bbe478ad281a37ea7a55a7b92dde41dd519e1c1fc

    • Size

      481KB

    • MD5

      492ac502625ece193958390e60ae7899

    • SHA1

      9271d015a0e045bc86f17216b6cb5a0cc299e222

    • SHA256

      5ae9cf456f352afc3d7f513bbe478ad281a37ea7a55a7b92dde41dd519e1c1fc

    • SHA512

      0347623af144de04608da82048c23dbadaba31d6bd85ab5798ab3ed35747ea5a4c0abbfd273de753a7f499c95891ccd97fcd7f9a6484a784c0a13393a54f266b

    • SSDEEP

      12288:NMrRy90FZCXPObJjLv5jgKCSNjuNsusOBGN:EyeZuP0JRwSNKE

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks