General

  • Target

    e5b8bc6610e3f6d8acc21f41bdf68d01f4f5c1f341c722fa292b1f85a1c149ae

  • Size

    500KB

  • Sample

    241108-zast3azakp

  • MD5

    86ad407479299e5b9f040b1fd7641fc4

  • SHA1

    2e92e43018067cae161992270b2fd23495939099

  • SHA256

    e5b8bc6610e3f6d8acc21f41bdf68d01f4f5c1f341c722fa292b1f85a1c149ae

  • SHA512

    baa9ad4619a2eda46b8c109f2642b7c728a73c55758dcae6026b69aef6dafeccdb9e31699c6e14f810cd301cab40d784cadba6b21986bef00df578f14fa5c725

  • SSDEEP

    12288:4MrVy90ZyQKEGgOh7LpvUE5/2BprrWmu5kET:dyo7F+nvU8OBlKmu20

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      e5b8bc6610e3f6d8acc21f41bdf68d01f4f5c1f341c722fa292b1f85a1c149ae

    • Size

      500KB

    • MD5

      86ad407479299e5b9f040b1fd7641fc4

    • SHA1

      2e92e43018067cae161992270b2fd23495939099

    • SHA256

      e5b8bc6610e3f6d8acc21f41bdf68d01f4f5c1f341c722fa292b1f85a1c149ae

    • SHA512

      baa9ad4619a2eda46b8c109f2642b7c728a73c55758dcae6026b69aef6dafeccdb9e31699c6e14f810cd301cab40d784cadba6b21986bef00df578f14fa5c725

    • SSDEEP

      12288:4MrVy90ZyQKEGgOh7LpvUE5/2BprrWmu5kET:dyo7F+nvU8OBlKmu20

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks