General

  • Target

    f76c75b32fc339e39bdf09e5a38cb4657ccf8d0c3051bda3cc4c487654540179

  • Size

    483KB

  • Sample

    241108-ydek6s1kbp

  • MD5

    82b537ebd53bf74703fa3915b494abf1

  • SHA1

    1a3832e4ccbb56a54574bb6b0b84d88e25938e5e

  • SHA256

    f76c75b32fc339e39bdf09e5a38cb4657ccf8d0c3051bda3cc4c487654540179

  • SHA512

    a3af902197194f5ef383a2c73f3ffb127af36ecc65f10509d54c187e3004af8f3029f7843e79824412fc86ec25aae379a15f35cebcb0579a8c24f5b2b72f02b8

  • SSDEEP

    12288:cMrAy90TFnYwGuExT1uGVMZuzcsAPI8C0b1e:syWlYkw1uDZuzpV

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      f76c75b32fc339e39bdf09e5a38cb4657ccf8d0c3051bda3cc4c487654540179

    • Size

      483KB

    • MD5

      82b537ebd53bf74703fa3915b494abf1

    • SHA1

      1a3832e4ccbb56a54574bb6b0b84d88e25938e5e

    • SHA256

      f76c75b32fc339e39bdf09e5a38cb4657ccf8d0c3051bda3cc4c487654540179

    • SHA512

      a3af902197194f5ef383a2c73f3ffb127af36ecc65f10509d54c187e3004af8f3029f7843e79824412fc86ec25aae379a15f35cebcb0579a8c24f5b2b72f02b8

    • SSDEEP

      12288:cMrAy90TFnYwGuExT1uGVMZuzcsAPI8C0b1e:syWlYkw1uDZuzpV

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks