General

  • Target

    08a6913c04d2bf8e94186dc94b27ce74f6b6fcc7e8552d56a51b17d9647b0402

  • Size

    484KB

  • Sample

    241108-yk1rzsyejl

  • MD5

    e2dd34157ed0dba3f1be7f82bc10336b

  • SHA1

    7eaa6e588e00c21b7eccb8f2bd96bf7d8da66bab

  • SHA256

    08a6913c04d2bf8e94186dc94b27ce74f6b6fcc7e8552d56a51b17d9647b0402

  • SHA512

    be468243b6fd949b3f2d4baa5f4e21793405c0a43c0ffa0bc806d6ec798d08e2ead7155d8c15e7abab28faf9a465efa5874da322b29192037ac72523e37d1955

  • SSDEEP

    12288:qMrZy90n2Ot0VDdBlKfGKC6P5uBypICkT9SeF:fyQOVBBMfGn6R/pIr

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      08a6913c04d2bf8e94186dc94b27ce74f6b6fcc7e8552d56a51b17d9647b0402

    • Size

      484KB

    • MD5

      e2dd34157ed0dba3f1be7f82bc10336b

    • SHA1

      7eaa6e588e00c21b7eccb8f2bd96bf7d8da66bab

    • SHA256

      08a6913c04d2bf8e94186dc94b27ce74f6b6fcc7e8552d56a51b17d9647b0402

    • SHA512

      be468243b6fd949b3f2d4baa5f4e21793405c0a43c0ffa0bc806d6ec798d08e2ead7155d8c15e7abab28faf9a465efa5874da322b29192037ac72523e37d1955

    • SSDEEP

      12288:qMrZy90n2Ot0VDdBlKfGKC6P5uBypICkT9SeF:fyQOVBBMfGn6R/pIr

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks