General

  • Target

    38c53cc10c66fd3a67476003455c6188426c2e65b30bcb9f235812b2ff893e8f

  • Size

    483KB

  • Sample

    241108-j22chsyhjl

  • MD5

    3f21cff25ef6fc758d29424810a1ac17

  • SHA1

    2919c71b519bf8191af39cf73c69db78f1ffecb7

  • SHA256

    38c53cc10c66fd3a67476003455c6188426c2e65b30bcb9f235812b2ff893e8f

  • SHA512

    215bb4368240d119d01ba37ce0f04274b50f6d58f1da0d2dd50a3e31a6b68edd5b12997debe128c0a9aede9fa30abeb7e5b7bb0f00dfd102effbeeb17f7511c4

  • SSDEEP

    12288:vMrmy90CTZW8VvT+xNxbdZbGuExT1uOVMZuzxsA6:9yHVb+3ddZnw1u7ZuzY

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      38c53cc10c66fd3a67476003455c6188426c2e65b30bcb9f235812b2ff893e8f

    • Size

      483KB

    • MD5

      3f21cff25ef6fc758d29424810a1ac17

    • SHA1

      2919c71b519bf8191af39cf73c69db78f1ffecb7

    • SHA256

      38c53cc10c66fd3a67476003455c6188426c2e65b30bcb9f235812b2ff893e8f

    • SHA512

      215bb4368240d119d01ba37ce0f04274b50f6d58f1da0d2dd50a3e31a6b68edd5b12997debe128c0a9aede9fa30abeb7e5b7bb0f00dfd102effbeeb17f7511c4

    • SSDEEP

      12288:vMrmy90CTZW8VvT+xNxbdZbGuExT1uOVMZuzxsA6:9yHVb+3ddZnw1u7ZuzY

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks