General

  • Target

    f2e9fa09874da56ce9de0df3fed44679b8ca1251f6a5bffa9165a3a4843794a4

  • Size

    471KB

  • Sample

    241109-mlvftasgpc

  • MD5

    d8365d6675b4e456cb5323f9dbb7b8bf

  • SHA1

    fac596d8267c3ef2902904824f6bcc7a2cdde4bf

  • SHA256

    f2e9fa09874da56ce9de0df3fed44679b8ca1251f6a5bffa9165a3a4843794a4

  • SHA512

    9f9a4bc792d12fd9a7c79bea21db01622e9c63d62202e3225e26693f2c4eb9667afeeff26eed80c05703945fee367e5c41cd9d30949324a31f9484014000ef35

  • SSDEEP

    12288:nMr/y908ubz/UkQ9HrlD9AL1ITzJDp4WF:AyFubbPQVlRC2Tth

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      f2e9fa09874da56ce9de0df3fed44679b8ca1251f6a5bffa9165a3a4843794a4

    • Size

      471KB

    • MD5

      d8365d6675b4e456cb5323f9dbb7b8bf

    • SHA1

      fac596d8267c3ef2902904824f6bcc7a2cdde4bf

    • SHA256

      f2e9fa09874da56ce9de0df3fed44679b8ca1251f6a5bffa9165a3a4843794a4

    • SHA512

      9f9a4bc792d12fd9a7c79bea21db01622e9c63d62202e3225e26693f2c4eb9667afeeff26eed80c05703945fee367e5c41cd9d30949324a31f9484014000ef35

    • SSDEEP

      12288:nMr/y908ubz/UkQ9HrlD9AL1ITzJDp4WF:AyFubbPQVlRC2Tth

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks