General

  • Target

    d2c0d566607ebb986ec2837b0f81a3607f49b5cf47e90fcf49bd8378f56ff741

  • Size

    483KB

  • Sample

    241109-tjytsazqck

  • MD5

    456c780c62d89b20a195ec5b19fd2faa

  • SHA1

    3943f1a4aab6b474336f3d7d802e19dfde54c6a9

  • SHA256

    d2c0d566607ebb986ec2837b0f81a3607f49b5cf47e90fcf49bd8378f56ff741

  • SHA512

    dc2a5aaae2499f82e51aa5e2509164b7881f8ba4c60a193f813b2d6886570655ace619da048d769cf32efbbd60e0029b1a883cb0b52dd6bde9425757132973b1

  • SSDEEP

    12288:zMrAy90PqtYxmM0jewkf53QiaFmULyMu5O/os7g7:HyftYxmBew4ZQi6mEu62

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      d2c0d566607ebb986ec2837b0f81a3607f49b5cf47e90fcf49bd8378f56ff741

    • Size

      483KB

    • MD5

      456c780c62d89b20a195ec5b19fd2faa

    • SHA1

      3943f1a4aab6b474336f3d7d802e19dfde54c6a9

    • SHA256

      d2c0d566607ebb986ec2837b0f81a3607f49b5cf47e90fcf49bd8378f56ff741

    • SHA512

      dc2a5aaae2499f82e51aa5e2509164b7881f8ba4c60a193f813b2d6886570655ace619da048d769cf32efbbd60e0029b1a883cb0b52dd6bde9425757132973b1

    • SSDEEP

      12288:zMrAy90PqtYxmM0jewkf53QiaFmULyMu5O/os7g7:HyftYxmBew4ZQi6mEu62

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks