General

  • Target

    f853c33234c6991ff97b9e847b2df5d764ba7228f420247cd973c71a2f6a1b6d

  • Size

    483KB

  • Sample

    241108-2e6mts1flj

  • MD5

    ef359139e0dba621124b9c79c6365007

  • SHA1

    727481d026d6bae4bd43b25addf5a28eb38c2a24

  • SHA256

    f853c33234c6991ff97b9e847b2df5d764ba7228f420247cd973c71a2f6a1b6d

  • SHA512

    6dcc83853dc4904437e10b393c0d40a78301b5f63d2d340c4a3b2878af30e64e5a07688ced3fa811536b77a36a6eafa20d5952dab4f0f4b55c9d524631b22fcc

  • SSDEEP

    12288:kMr1y90HgFXHB4KpP9w3sOUYMwBtNHDDLDWdmg:ZyXXlC3sOtMiB7D3g

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      f853c33234c6991ff97b9e847b2df5d764ba7228f420247cd973c71a2f6a1b6d

    • Size

      483KB

    • MD5

      ef359139e0dba621124b9c79c6365007

    • SHA1

      727481d026d6bae4bd43b25addf5a28eb38c2a24

    • SHA256

      f853c33234c6991ff97b9e847b2df5d764ba7228f420247cd973c71a2f6a1b6d

    • SHA512

      6dcc83853dc4904437e10b393c0d40a78301b5f63d2d340c4a3b2878af30e64e5a07688ced3fa811536b77a36a6eafa20d5952dab4f0f4b55c9d524631b22fcc

    • SSDEEP

      12288:kMr1y90HgFXHB4KpP9w3sOUYMwBtNHDDLDWdmg:ZyXXlC3sOtMiB7D3g

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks