General

  • Target

    671365ca3ad7867ef69b74c76a861c8de197d88e86a9f681c49ff703945c0dd4

  • Size

    500KB

  • Sample

    241108-r11nlatjev

  • MD5

    b35aac2302710b58e603a478c976a21f

  • SHA1

    d3aeb8905432d1a5501d2cf658ea9697732bbb10

  • SHA256

    671365ca3ad7867ef69b74c76a861c8de197d88e86a9f681c49ff703945c0dd4

  • SHA512

    656ec607d2cfb008bd8ce7090d08d10379fe8fdb9999881702b86ff1cdf1834aee9663b6f1d9e9161e666dd25e22f3b9b42e6b5abd6f19bd8f3024b1edaba3ef

  • SSDEEP

    12288:0MrAy90gwzXcGeMWbY7ezPp002W/TiFSgNxtj:cykLcUYY+GpW/QVNj

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      671365ca3ad7867ef69b74c76a861c8de197d88e86a9f681c49ff703945c0dd4

    • Size

      500KB

    • MD5

      b35aac2302710b58e603a478c976a21f

    • SHA1

      d3aeb8905432d1a5501d2cf658ea9697732bbb10

    • SHA256

      671365ca3ad7867ef69b74c76a861c8de197d88e86a9f681c49ff703945c0dd4

    • SHA512

      656ec607d2cfb008bd8ce7090d08d10379fe8fdb9999881702b86ff1cdf1834aee9663b6f1d9e9161e666dd25e22f3b9b42e6b5abd6f19bd8f3024b1edaba3ef

    • SSDEEP

      12288:0MrAy90gwzXcGeMWbY7ezPp002W/TiFSgNxtj:cykLcUYY+GpW/QVNj

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks