General

  • Target

    87d535900d5ce8505f55b4196c237f91104cd18345e703e7291eaf42b1953b57

  • Size

    484KB

  • Sample

    241107-rppryswncp

  • MD5

    52fe52e198c4e78e734b42903de4a563

  • SHA1

    6e0efed84d6bd78d86f0c739456876dff2dd4ece

  • SHA256

    87d535900d5ce8505f55b4196c237f91104cd18345e703e7291eaf42b1953b57

  • SHA512

    86dccb1723f85801e272b6adb0d9972792e759097d3fd785af24555089b32146defdef74c1c7d2bd11b4b016b3081eafbce4d7783e9a5b0fc3973aa70d94c8be

  • SSDEEP

    12288:jMrgy903Rt6ynpBnqob5aXpJ12x/ie/yPXwBI2:7yyXpBnlb5aZJEx/v4XKJ

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      87d535900d5ce8505f55b4196c237f91104cd18345e703e7291eaf42b1953b57

    • Size

      484KB

    • MD5

      52fe52e198c4e78e734b42903de4a563

    • SHA1

      6e0efed84d6bd78d86f0c739456876dff2dd4ece

    • SHA256

      87d535900d5ce8505f55b4196c237f91104cd18345e703e7291eaf42b1953b57

    • SHA512

      86dccb1723f85801e272b6adb0d9972792e759097d3fd785af24555089b32146defdef74c1c7d2bd11b4b016b3081eafbce4d7783e9a5b0fc3973aa70d94c8be

    • SSDEEP

      12288:jMrgy903Rt6ynpBnqob5aXpJ12x/ie/yPXwBI2:7yyXpBnlb5aZJEx/v4XKJ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks