General

  • Target

    e8c75089df2f7661bc5888ec0ace3c2aad9e110c445da7bb7dd778adb2d80b53

  • Size

    484KB

  • Sample

    241109-tvmkwsxgld

  • MD5

    a71f1ff1ec0238b43ef7a0dee7f5aa31

  • SHA1

    1b9e056f028f79f0beeb624fa8be8b42677dde67

  • SHA256

    e8c75089df2f7661bc5888ec0ace3c2aad9e110c445da7bb7dd778adb2d80b53

  • SHA512

    9560472ed3a4d53f94d959176ad77524112e5af50fd52dfdd6dd1a6fab378528c26974769412a8bb039c1864e382ecee02b7c37a98753ca5af5421773a87d30f

  • SSDEEP

    12288:XMrOy90x27V8py/nXtaJ12xaie//uN9OP:Ny7Vf/nXtaJExavGN9OP

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      e8c75089df2f7661bc5888ec0ace3c2aad9e110c445da7bb7dd778adb2d80b53

    • Size

      484KB

    • MD5

      a71f1ff1ec0238b43ef7a0dee7f5aa31

    • SHA1

      1b9e056f028f79f0beeb624fa8be8b42677dde67

    • SHA256

      e8c75089df2f7661bc5888ec0ace3c2aad9e110c445da7bb7dd778adb2d80b53

    • SHA512

      9560472ed3a4d53f94d959176ad77524112e5af50fd52dfdd6dd1a6fab378528c26974769412a8bb039c1864e382ecee02b7c37a98753ca5af5421773a87d30f

    • SSDEEP

      12288:XMrOy90x27V8py/nXtaJ12xaie//uN9OP:Ny7Vf/nXtaJExavGN9OP

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks