General

  • Target

    447626370e05e837d5317db63c546ac8ace2292de1a812b9bdb17979475a3483

  • Size

    721KB

  • Sample

    241107-lb6weszcke

  • MD5

    0d3de97c151da130351e28e4c2145aa4

  • SHA1

    efeffaf008298787c7ee19fb48706f758b95ee20

  • SHA256

    447626370e05e837d5317db63c546ac8ace2292de1a812b9bdb17979475a3483

  • SHA512

    b608c0ec919266b83a92056a316adc9892495f9c4a2b6188c895b10212ed2ceb48b54883c590a7e5888a18ad8d498cf2550e4eea35dcb69801731402bf3e2432

  • SSDEEP

    12288:mMrmy90IkQlGak5LiOeFguo3+iObEwFubtD9UbdqWlaKrW9zJVjhFTSpNsd6z/DO:syHlGedo9ObEwkbtvKrW9DhFT09/DO

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      447626370e05e837d5317db63c546ac8ace2292de1a812b9bdb17979475a3483

    • Size

      721KB

    • MD5

      0d3de97c151da130351e28e4c2145aa4

    • SHA1

      efeffaf008298787c7ee19fb48706f758b95ee20

    • SHA256

      447626370e05e837d5317db63c546ac8ace2292de1a812b9bdb17979475a3483

    • SHA512

      b608c0ec919266b83a92056a316adc9892495f9c4a2b6188c895b10212ed2ceb48b54883c590a7e5888a18ad8d498cf2550e4eea35dcb69801731402bf3e2432

    • SSDEEP

      12288:mMrmy90IkQlGak5LiOeFguo3+iObEwFubtD9UbdqWlaKrW9zJVjhFTSpNsd6z/DO:syHlGedo9ObEwkbtvKrW9DhFT09/DO

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks