General

  • Target

    d1950c45ef291f039313e4baa5f5a86ed1b55c363c46e0adde9bc60351262fd9

  • Size

    478KB

  • Sample

    241108-plj17asdje

  • MD5

    c5866f317d1039b18fcfdeaa8f5a7de7

  • SHA1

    de24f463900e896ad376e05ac1db0a7691a47f9d

  • SHA256

    d1950c45ef291f039313e4baa5f5a86ed1b55c363c46e0adde9bc60351262fd9

  • SHA512

    2a4099dbb46a5daead655b3fba66d3a6f555233b3e995ac46fc74e16f0a548bbbe91206787af3d24fc0637b66f4bc4e08ae38424d268c574fc194b475141d1cf

  • SSDEEP

    12288:3Mruy90xIQU/BxjJ8ncrpVKcKZfQ9da4rQ:RyWIZBxjGnqpDKx0a4Q

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      d1950c45ef291f039313e4baa5f5a86ed1b55c363c46e0adde9bc60351262fd9

    • Size

      478KB

    • MD5

      c5866f317d1039b18fcfdeaa8f5a7de7

    • SHA1

      de24f463900e896ad376e05ac1db0a7691a47f9d

    • SHA256

      d1950c45ef291f039313e4baa5f5a86ed1b55c363c46e0adde9bc60351262fd9

    • SHA512

      2a4099dbb46a5daead655b3fba66d3a6f555233b3e995ac46fc74e16f0a548bbbe91206787af3d24fc0637b66f4bc4e08ae38424d268c574fc194b475141d1cf

    • SSDEEP

      12288:3Mruy90xIQU/BxjJ8ncrpVKcKZfQ9da4rQ:RyWIZBxjGnqpDKx0a4Q

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks