General

  • Target

    51def1bb3b07e889f32209e173c0fb35746167b117f3ed1292cd5785093e636e

  • Size

    499KB

  • Sample

    241107-vkyqvaynaj

  • MD5

    34addba1f8e8e96926f17320b4b0cdf5

  • SHA1

    6479ed394bfc5a71ab267a33dee7c75ea7cf03ef

  • SHA256

    51def1bb3b07e889f32209e173c0fb35746167b117f3ed1292cd5785093e636e

  • SHA512

    7ea00ea27c315eb8d93fee12ce1ae1f78a1e8d26c4dfdb7faecf6436f24bcc08f5dd5e8d14531e864a7c51f173142542d28f6ff3d63bf6e95d0f90284e4104c2

  • SSDEEP

    12288:uMrty90T7zGSlIWS1GoUGhZvSVJx5+b2s/:HyDLWScoUGhJSVJnC22

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      51def1bb3b07e889f32209e173c0fb35746167b117f3ed1292cd5785093e636e

    • Size

      499KB

    • MD5

      34addba1f8e8e96926f17320b4b0cdf5

    • SHA1

      6479ed394bfc5a71ab267a33dee7c75ea7cf03ef

    • SHA256

      51def1bb3b07e889f32209e173c0fb35746167b117f3ed1292cd5785093e636e

    • SHA512

      7ea00ea27c315eb8d93fee12ce1ae1f78a1e8d26c4dfdb7faecf6436f24bcc08f5dd5e8d14531e864a7c51f173142542d28f6ff3d63bf6e95d0f90284e4104c2

    • SSDEEP

      12288:uMrty90T7zGSlIWS1GoUGhZvSVJx5+b2s/:HyDLWScoUGhJSVJnC22

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks