General

  • Target

    04a2ae43630e1a5278137e548ef1dde341f05cf9d9fde5864d54fa0c48306a0d

  • Size

    500KB

  • Sample

    241108-xypffazqfl

  • MD5

    6eecbe6a5401a4a324c4c6f23aaaa44a

  • SHA1

    5465d33d50d926756f3de70e7a457a690b182911

  • SHA256

    04a2ae43630e1a5278137e548ef1dde341f05cf9d9fde5864d54fa0c48306a0d

  • SHA512

    936a3695c11a142697bf83cea3de6800ecfe9fb418c7366b5e6a9773c7735f72f6e0c8dfae40d5aa001cca7e62208739a80e8df85f3c464b6af644efcde5e731

  • SSDEEP

    12288:IMrly90HkzWpHFTF05lF2ftS6aRQ4hwHs+UQ5:tyMjrTFElg1zCUUQ5

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      04a2ae43630e1a5278137e548ef1dde341f05cf9d9fde5864d54fa0c48306a0d

    • Size

      500KB

    • MD5

      6eecbe6a5401a4a324c4c6f23aaaa44a

    • SHA1

      5465d33d50d926756f3de70e7a457a690b182911

    • SHA256

      04a2ae43630e1a5278137e548ef1dde341f05cf9d9fde5864d54fa0c48306a0d

    • SHA512

      936a3695c11a142697bf83cea3de6800ecfe9fb418c7366b5e6a9773c7735f72f6e0c8dfae40d5aa001cca7e62208739a80e8df85f3c464b6af644efcde5e731

    • SSDEEP

      12288:IMrly90HkzWpHFTF05lF2ftS6aRQ4hwHs+UQ5:tyMjrTFElg1zCUUQ5

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks