General

  • Target

    e60b9fccfff8b61bed69cd6209b5a8e76ddf48e41f82dc28361090dff551abd6

  • Size

    471KB

  • Sample

    241108-y432fsyfpd

  • MD5

    e70a8d7d70c202e2e50a280cad837c08

  • SHA1

    8940cb6c298e48749e7002a53134ef1f692b5c41

  • SHA256

    e60b9fccfff8b61bed69cd6209b5a8e76ddf48e41f82dc28361090dff551abd6

  • SHA512

    d2d03101c9437ba6c901aaf9f499df2087f54822b64642b9501879f405b846a47df41a9f4ef71446dc5ce8398c39f47307d74adb5c5e0fafeb9ac192920c7a86

  • SSDEEP

    12288:1Mr3y90Bd7WVVb1xzxlD9ABXITz8DsoWs:yy4dyVVrzxlR44Tor

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      e60b9fccfff8b61bed69cd6209b5a8e76ddf48e41f82dc28361090dff551abd6

    • Size

      471KB

    • MD5

      e70a8d7d70c202e2e50a280cad837c08

    • SHA1

      8940cb6c298e48749e7002a53134ef1f692b5c41

    • SHA256

      e60b9fccfff8b61bed69cd6209b5a8e76ddf48e41f82dc28361090dff551abd6

    • SHA512

      d2d03101c9437ba6c901aaf9f499df2087f54822b64642b9501879f405b846a47df41a9f4ef71446dc5ce8398c39f47307d74adb5c5e0fafeb9ac192920c7a86

    • SSDEEP

      12288:1Mr3y90Bd7WVVb1xzxlD9ABXITz8DsoWs:yy4dyVVrzxlR44Tor

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks