General

  • Target

    dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af

  • Size

    500KB

  • Sample

    241109-m2p62atamp

  • MD5

    fe38008e6d81346e69bcb54e62b5f8b8

  • SHA1

    ad9bf96ba806c12a347f7805004856550f87de76

  • SHA256

    dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af

  • SHA512

    d2dc99fef5b240a8c4d51e9047c6d81d9b09a2691222095bc6616e8faed6562aeffe9fb3f9d4c7e44bc547b1a1c9c8d7c866fb92bac8d4fcb75403bf7b9aaa63

  • SSDEEP

    12288:ZMrcy90yTKfltNecyIObkK5/2LprRWJkXTxGOHxe:ByR+ocRObkaOLlMJkjU60

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af

    • Size

      500KB

    • MD5

      fe38008e6d81346e69bcb54e62b5f8b8

    • SHA1

      ad9bf96ba806c12a347f7805004856550f87de76

    • SHA256

      dc0d5b37125864e9c1567612373b54fc84642c21b1c48eb4d55641b144dbe1af

    • SHA512

      d2dc99fef5b240a8c4d51e9047c6d81d9b09a2691222095bc6616e8faed6562aeffe9fb3f9d4c7e44bc547b1a1c9c8d7c866fb92bac8d4fcb75403bf7b9aaa63

    • SSDEEP

      12288:ZMrcy90yTKfltNecyIObkK5/2LprRWJkXTxGOHxe:ByR+ocRObkaOLlMJkjU60

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks