General

  • Target

    d8cdfe5c05a8400e7e7e33d7388d8710e4d1e183b17af9f85487bf9e3ee97717

  • Size

    483KB

  • Sample

    241109-eqxgzawqay

  • MD5

    9a2ca1c03c5901dbff0efcea7c625da7

  • SHA1

    2461c2dbef22b7f4a7aa4e859fa7edcf0dd2bf95

  • SHA256

    d8cdfe5c05a8400e7e7e33d7388d8710e4d1e183b17af9f85487bf9e3ee97717

  • SHA512

    351872219e79894ec89a171f998de425f0612dcfa8dc219e3a9f11819c917d9b682f47b6a7cbfa2aa3e4d99249646cec040f0be51c4f860458be2c939b41ee4b

  • SSDEEP

    12288:gMroy90IrG6VYFlpnjmrQUc8puGuExT1ueVMZuzVsAsUjczSX:4yZtV4cQI6w1urZuztj2SX

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      d8cdfe5c05a8400e7e7e33d7388d8710e4d1e183b17af9f85487bf9e3ee97717

    • Size

      483KB

    • MD5

      9a2ca1c03c5901dbff0efcea7c625da7

    • SHA1

      2461c2dbef22b7f4a7aa4e859fa7edcf0dd2bf95

    • SHA256

      d8cdfe5c05a8400e7e7e33d7388d8710e4d1e183b17af9f85487bf9e3ee97717

    • SHA512

      351872219e79894ec89a171f998de425f0612dcfa8dc219e3a9f11819c917d9b682f47b6a7cbfa2aa3e4d99249646cec040f0be51c4f860458be2c939b41ee4b

    • SSDEEP

      12288:gMroy90IrG6VYFlpnjmrQUc8puGuExT1ueVMZuzVsAsUjczSX:4yZtV4cQI6w1urZuztj2SX

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks