General

  • Target

    e6097049dde1f5772ddb243de2bfb78fe8544b323dceacffc928785cf09213d0

  • Size

    720KB

  • Sample

    241108-elnz2avfrr

  • MD5

    ca10a7e0db185080ef22fad17e323b2e

  • SHA1

    208acec1ffe6ec34740fe7a5c22cf9d831872f0b

  • SHA256

    e6097049dde1f5772ddb243de2bfb78fe8544b323dceacffc928785cf09213d0

  • SHA512

    6ef45c97e01ec912b8ba91b64403be164706fce073cc0c7d464f8c19eb445bbd37ba06b003909e20547eeba371e6d69394da0eb5c7e6182f29c603ef59f3ade2

  • SSDEEP

    12288:kMr0y908yMlsVkkLCWAC24uhgZYuaxHTR3U7oWFaKMWMlO7Evc/jTaxcDV:Ayl3ALhACNgf/XKMWMojuK

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      e6097049dde1f5772ddb243de2bfb78fe8544b323dceacffc928785cf09213d0

    • Size

      720KB

    • MD5

      ca10a7e0db185080ef22fad17e323b2e

    • SHA1

      208acec1ffe6ec34740fe7a5c22cf9d831872f0b

    • SHA256

      e6097049dde1f5772ddb243de2bfb78fe8544b323dceacffc928785cf09213d0

    • SHA512

      6ef45c97e01ec912b8ba91b64403be164706fce073cc0c7d464f8c19eb445bbd37ba06b003909e20547eeba371e6d69394da0eb5c7e6182f29c603ef59f3ade2

    • SSDEEP

      12288:kMr0y908yMlsVkkLCWAC24uhgZYuaxHTR3U7oWFaKMWMlO7Evc/jTaxcDV:Ayl3ALhACNgf/XKMWMojuK

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks