General

  • Target

    ec098fd7d3d2e1a553666af3104b84054030079ee751523a0cede4c5a1e4f75e

  • Size

    484KB

  • Sample

    241107-ejnaqavfka

  • MD5

    9c9158b63d0732d1aa66069e928f5901

  • SHA1

    cd6f315484eda228fd1e679f3432a8de8ab8331d

  • SHA256

    ec098fd7d3d2e1a553666af3104b84054030079ee751523a0cede4c5a1e4f75e

  • SHA512

    48feaf14cb78d78f0283d0660a5c02dce5eff026fc857c23620c251d31dc9991599166bfdae228ec255468cbcb6f8b0f6821c7cf88a5bfb2fdcc5286af94dd2d

  • SSDEEP

    12288:fMrXy90bBLWe8Vyiw4itLqQC665uKypICkBn1LAqX:syk47VDw46C6oApID1LnX

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      ec098fd7d3d2e1a553666af3104b84054030079ee751523a0cede4c5a1e4f75e

    • Size

      484KB

    • MD5

      9c9158b63d0732d1aa66069e928f5901

    • SHA1

      cd6f315484eda228fd1e679f3432a8de8ab8331d

    • SHA256

      ec098fd7d3d2e1a553666af3104b84054030079ee751523a0cede4c5a1e4f75e

    • SHA512

      48feaf14cb78d78f0283d0660a5c02dce5eff026fc857c23620c251d31dc9991599166bfdae228ec255468cbcb6f8b0f6821c7cf88a5bfb2fdcc5286af94dd2d

    • SSDEEP

      12288:fMrXy90bBLWe8Vyiw4itLqQC665uKypICkBn1LAqX:syk47VDw46C6oApID1LnX

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks