General

  • Target

    33e10d42ccb9bc3fd096b7ced7924a63f19f9b60f538f89ae02b0a0016b248d3

  • Size

    478KB

  • Sample

    241108-xrle7sxfka

  • MD5

    2765acbbe282fcfe1abcd89607d1a097

  • SHA1

    4aa851c0a0b36ab34cfa96509dd329eb91328c20

  • SHA256

    33e10d42ccb9bc3fd096b7ced7924a63f19f9b60f538f89ae02b0a0016b248d3

  • SHA512

    04d5dc323542b982dc5c128ae53f2b39e8419159cd9aaff16b939deb96fb62e930f6f1d195d78d8c6320cee5ec68a91f8960f3fe81a278a44bd98e9a4c59e494

  • SSDEEP

    12288:QMrdy90yXUwsmvpVkUoa/0b4EtiGO/RhdFLo2NoS:dyPXUmBVkJJEtJV

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      33e10d42ccb9bc3fd096b7ced7924a63f19f9b60f538f89ae02b0a0016b248d3

    • Size

      478KB

    • MD5

      2765acbbe282fcfe1abcd89607d1a097

    • SHA1

      4aa851c0a0b36ab34cfa96509dd329eb91328c20

    • SHA256

      33e10d42ccb9bc3fd096b7ced7924a63f19f9b60f538f89ae02b0a0016b248d3

    • SHA512

      04d5dc323542b982dc5c128ae53f2b39e8419159cd9aaff16b939deb96fb62e930f6f1d195d78d8c6320cee5ec68a91f8960f3fe81a278a44bd98e9a4c59e494

    • SSDEEP

      12288:QMrdy90yXUwsmvpVkUoa/0b4EtiGO/RhdFLo2NoS:dyPXUmBVkJJEtJV

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks