General

  • Target

    43bd7d4e43b4c3a1fa3564f17202e7db9f0ee8f01f86bde6f857e7a0bb870cd1

  • Size

    482KB

  • Sample

    241108-2eh7jazra1

  • MD5

    7a1ee78787a3033a69e2c5b18a14dbdb

  • SHA1

    f6fb01dac88abb87a71f802535a961dca369f48e

  • SHA256

    43bd7d4e43b4c3a1fa3564f17202e7db9f0ee8f01f86bde6f857e7a0bb870cd1

  • SHA512

    918a817a63124a5012b41520cd475a6c6618e02ab68cb871fe8f600a0f98d35aec20b4fc1bb9ea9893763fce839ebd5e98be8da2200043e7097684aa885ae341

  • SSDEEP

    12288:gMrAy90CkqNve8m9qlG/0HDQKaUvp9pec1rPah7Bl4z:wyfdlmQeU7aWprecQiz

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      43bd7d4e43b4c3a1fa3564f17202e7db9f0ee8f01f86bde6f857e7a0bb870cd1

    • Size

      482KB

    • MD5

      7a1ee78787a3033a69e2c5b18a14dbdb

    • SHA1

      f6fb01dac88abb87a71f802535a961dca369f48e

    • SHA256

      43bd7d4e43b4c3a1fa3564f17202e7db9f0ee8f01f86bde6f857e7a0bb870cd1

    • SHA512

      918a817a63124a5012b41520cd475a6c6618e02ab68cb871fe8f600a0f98d35aec20b4fc1bb9ea9893763fce839ebd5e98be8da2200043e7097684aa885ae341

    • SSDEEP

      12288:gMrAy90CkqNve8m9qlG/0HDQKaUvp9pec1rPah7Bl4z:wyfdlmQeU7aWprecQiz

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks