General

  • Target

    11eb3180b2230df832d37370f1dd8fad086e0c914392a557126ad78cc4524807

  • Size

    478KB

  • Sample

    241109-dntgvswela

  • MD5

    01368d9c75536c81f4939b9d811c770a

  • SHA1

    36894d61873b07fa51d6ee61f43d31e9b9f2899c

  • SHA256

    11eb3180b2230df832d37370f1dd8fad086e0c914392a557126ad78cc4524807

  • SHA512

    2bd22f7b9d46890ce1a21740c48ec5e3f3d03b5eff54febabdeadf7042e1c59e6d5f83485ff849387d760557b351d6e16033328c8a55592f49578c423530cb48

  • SSDEEP

    6144:KEy+bnr+Fp0yN90QEG8JhI5LymZdORJAVR4/P+1rlC/nN8Yyfc/nDl/AH1gkK/IM:cMr1y90k+goR8Rw+1Qyfq/AHVZBexN/

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      11eb3180b2230df832d37370f1dd8fad086e0c914392a557126ad78cc4524807

    • Size

      478KB

    • MD5

      01368d9c75536c81f4939b9d811c770a

    • SHA1

      36894d61873b07fa51d6ee61f43d31e9b9f2899c

    • SHA256

      11eb3180b2230df832d37370f1dd8fad086e0c914392a557126ad78cc4524807

    • SHA512

      2bd22f7b9d46890ce1a21740c48ec5e3f3d03b5eff54febabdeadf7042e1c59e6d5f83485ff849387d760557b351d6e16033328c8a55592f49578c423530cb48

    • SSDEEP

      6144:KEy+bnr+Fp0yN90QEG8JhI5LymZdORJAVR4/P+1rlC/nN8Yyfc/nDl/AH1gkK/IM:cMr1y90k+goR8Rw+1Qyfq/AHVZBexN/

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks