General

  • Target

    28a8b4a1270a2dbbdd38b324dfb6b3d2fe4ff2b4c3f83d45f9b5f91d82ad08b7

  • Size

    484KB

  • Sample

    241108-yp3r5syeql

  • MD5

    a03c4dcd4acc57491cedbb447fda3c82

  • SHA1

    8622dfdd6cb46ef2a3d6af4f591c24e852159683

  • SHA256

    28a8b4a1270a2dbbdd38b324dfb6b3d2fe4ff2b4c3f83d45f9b5f91d82ad08b7

  • SHA512

    5363afc31faae2b375386643c3ced2e25c5f178453155ae9fffe1d55c0638663cda675acbada8c4efc8272264f767682a164d9856fe5410ece90ae115ae498de

  • SSDEEP

    12288:6MrXy90KXhMWaqlftD5glRDDUJ12xjie/GW1rIy5TH:ZyZ+qf5g7UJExjvFL5TH

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      28a8b4a1270a2dbbdd38b324dfb6b3d2fe4ff2b4c3f83d45f9b5f91d82ad08b7

    • Size

      484KB

    • MD5

      a03c4dcd4acc57491cedbb447fda3c82

    • SHA1

      8622dfdd6cb46ef2a3d6af4f591c24e852159683

    • SHA256

      28a8b4a1270a2dbbdd38b324dfb6b3d2fe4ff2b4c3f83d45f9b5f91d82ad08b7

    • SHA512

      5363afc31faae2b375386643c3ced2e25c5f178453155ae9fffe1d55c0638663cda675acbada8c4efc8272264f767682a164d9856fe5410ece90ae115ae498de

    • SSDEEP

      12288:6MrXy90KXhMWaqlftD5glRDDUJ12xjie/GW1rIy5TH:ZyZ+qf5g7UJExjvFL5TH

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks