General

  • Target

    d0a4692e5e75842868fff463ebec991cb6ed5b1152b041bf45600341547c8cb8

  • Size

    482KB

  • Sample

    241108-b5bx2asekh

  • MD5

    b69df586e4c849131baf540f014277e2

  • SHA1

    06a88e068d0e255509aaaa5867ace47a2ef21d46

  • SHA256

    d0a4692e5e75842868fff463ebec991cb6ed5b1152b041bf45600341547c8cb8

  • SHA512

    47f81e6e03ef7d5f7f6d5e6ceca15af2b66b7effa5b5257651667b50d182673026ec4eaba02f6a39a9bdde98f881de999c624fd1d6f96f75e220e9969c4bcc1b

  • SSDEEP

    12288:4MrWy90LP4h+HjUDQKaUPp9pec1rPam7RpkmZ:uy8Pdq7a2precQq

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      d0a4692e5e75842868fff463ebec991cb6ed5b1152b041bf45600341547c8cb8

    • Size

      482KB

    • MD5

      b69df586e4c849131baf540f014277e2

    • SHA1

      06a88e068d0e255509aaaa5867ace47a2ef21d46

    • SHA256

      d0a4692e5e75842868fff463ebec991cb6ed5b1152b041bf45600341547c8cb8

    • SHA512

      47f81e6e03ef7d5f7f6d5e6ceca15af2b66b7effa5b5257651667b50d182673026ec4eaba02f6a39a9bdde98f881de999c624fd1d6f96f75e220e9969c4bcc1b

    • SSDEEP

      12288:4MrWy90LP4h+HjUDQKaUPp9pec1rPam7RpkmZ:uy8Pdq7a2precQq

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks