General

  • Target

    a3e5f7b88a067f5047bdc35bc49aa1ee66f02e1641819c0aa46e7110e17c6418

  • Size

    482KB

  • Sample

    241108-xwnq5axhpq

  • MD5

    b44eb25179942ac9daa1c6cd0bce443f

  • SHA1

    9c1bbae464c5c2eb5560ec245da7bcb3f5c23da8

  • SHA256

    a3e5f7b88a067f5047bdc35bc49aa1ee66f02e1641819c0aa46e7110e17c6418

  • SHA512

    a19a5b433fdcfe2b88378b923b5dd0c8a8b889304a3d46e085d64e116adee300cddd208ed13201388e1d28b19a3c4839c654b59350326cdb4cc4ca4d3dd664a7

  • SSDEEP

    12288:FMrOy90oE2VpiRmHG8WLOQjeX/C43zEJHGWrqJp/6X0:DyJjVURmm7OoS6OzERcp/f

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      a3e5f7b88a067f5047bdc35bc49aa1ee66f02e1641819c0aa46e7110e17c6418

    • Size

      482KB

    • MD5

      b44eb25179942ac9daa1c6cd0bce443f

    • SHA1

      9c1bbae464c5c2eb5560ec245da7bcb3f5c23da8

    • SHA256

      a3e5f7b88a067f5047bdc35bc49aa1ee66f02e1641819c0aa46e7110e17c6418

    • SHA512

      a19a5b433fdcfe2b88378b923b5dd0c8a8b889304a3d46e085d64e116adee300cddd208ed13201388e1d28b19a3c4839c654b59350326cdb4cc4ca4d3dd664a7

    • SSDEEP

      12288:FMrOy90oE2VpiRmHG8WLOQjeX/C43zEJHGWrqJp/6X0:DyJjVURmm7OoS6OzERcp/f

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks