General

  • Target

    fe4fc85bdc2d083252848d698e35f925dba63370f8ab9eb08c40a6bca745dd44

  • Size

    500KB

  • Sample

    241108-mn29fazmgy

  • MD5

    e74af7df71b109ec3b23aa7276e1aec3

  • SHA1

    d0de4bc1675ba2a94e34aa707266c1d1fb1a86c7

  • SHA256

    fe4fc85bdc2d083252848d698e35f925dba63370f8ab9eb08c40a6bca745dd44

  • SHA512

    954ee1c28184c27b1aee202826e96f465c4783b20ace8ade0648d032926a3a86bc72b587af09700da91d836087591e4fa9d78dc6d5be855617833d2cdbf23cab

  • SSDEEP

    12288:bMrMy904OFlSZPdEvKuNsiYdtlplrDm8:HypO7SldmG3dt7lrD9

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      fe4fc85bdc2d083252848d698e35f925dba63370f8ab9eb08c40a6bca745dd44

    • Size

      500KB

    • MD5

      e74af7df71b109ec3b23aa7276e1aec3

    • SHA1

      d0de4bc1675ba2a94e34aa707266c1d1fb1a86c7

    • SHA256

      fe4fc85bdc2d083252848d698e35f925dba63370f8ab9eb08c40a6bca745dd44

    • SHA512

      954ee1c28184c27b1aee202826e96f465c4783b20ace8ade0648d032926a3a86bc72b587af09700da91d836087591e4fa9d78dc6d5be855617833d2cdbf23cab

    • SSDEEP

      12288:bMrMy904OFlSZPdEvKuNsiYdtlplrDm8:HypO7SldmG3dt7lrD9

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks