General

  • Target

    743c7ecc1b2327efc0d92dddae63018512701332cf3617d37261e5ddd218b3a9

  • Size

    478KB

  • Sample

    241108-3r53haseql

  • MD5

    2180657093d5cce3820ac8fe756c0a9b

  • SHA1

    67d259243cf28394ec8337de50fc182e053ca108

  • SHA256

    743c7ecc1b2327efc0d92dddae63018512701332cf3617d37261e5ddd218b3a9

  • SHA512

    bc8b8adfbf057c51d96b61c644f558234f56167f8d8ec4f20c9ff3b113c98713a459749a712154f098a0132bce6947d84db785054cdda1ed0e0bdae5baa63e12

  • SSDEEP

    12288:bMr8y90FuNLDVl/M0Udgzo86J7v/AHtZjrezr:Pymu5VlUbdg8ZWH34r

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      743c7ecc1b2327efc0d92dddae63018512701332cf3617d37261e5ddd218b3a9

    • Size

      478KB

    • MD5

      2180657093d5cce3820ac8fe756c0a9b

    • SHA1

      67d259243cf28394ec8337de50fc182e053ca108

    • SHA256

      743c7ecc1b2327efc0d92dddae63018512701332cf3617d37261e5ddd218b3a9

    • SHA512

      bc8b8adfbf057c51d96b61c644f558234f56167f8d8ec4f20c9ff3b113c98713a459749a712154f098a0132bce6947d84db785054cdda1ed0e0bdae5baa63e12

    • SSDEEP

      12288:bMr8y90FuNLDVl/M0Udgzo86J7v/AHtZjrezr:Pymu5VlUbdg8ZWH34r

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks