General

  • Target

    d4363afc137ddeec5aa19848294a454c9a6e0133fb5bb6c8eccc882c85c9a613

  • Size

    481KB

  • Sample

    241108-jxja5s1mdn

  • MD5

    d9625ba7eb7d65626571132128840243

  • SHA1

    8ab1a484548cc53215d680550cf579d53713d1c9

  • SHA256

    d4363afc137ddeec5aa19848294a454c9a6e0133fb5bb6c8eccc882c85c9a613

  • SHA512

    b1359789086b2623e29bebf1443588e46e16e3eee179fee312ced057030140ecf67e9866cf91cd3b1daec22732ad0e3febfb79519be99f8304d17b3bc8e70fc6

  • SSDEEP

    12288:5Mr4y90R3ji9JB9/XYihLe7sj6RUksf717:ByY3jYJb/tLekNp7

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      d4363afc137ddeec5aa19848294a454c9a6e0133fb5bb6c8eccc882c85c9a613

    • Size

      481KB

    • MD5

      d9625ba7eb7d65626571132128840243

    • SHA1

      8ab1a484548cc53215d680550cf579d53713d1c9

    • SHA256

      d4363afc137ddeec5aa19848294a454c9a6e0133fb5bb6c8eccc882c85c9a613

    • SHA512

      b1359789086b2623e29bebf1443588e46e16e3eee179fee312ced057030140ecf67e9866cf91cd3b1daec22732ad0e3febfb79519be99f8304d17b3bc8e70fc6

    • SSDEEP

      12288:5Mr4y90R3ji9JB9/XYihLe7sj6RUksf717:ByY3jYJb/tLekNp7

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks