General

  • Target

    ae3000814a659fd29e2169c17eb79809b38b62cdfde44c8de514aaa092c064bd

  • Size

    478KB

  • Sample

    241109-x4pcmazhrc

  • MD5

    fc231eb3e06720bd085c84b09be5683d

  • SHA1

    a5577ba53c19b3b928dfdad02a963db3c40dd9cb

  • SHA256

    ae3000814a659fd29e2169c17eb79809b38b62cdfde44c8de514aaa092c064bd

  • SHA512

    3c1076c9a52153d6d269fa6036ebb599d48fd7b3a17bbc70def544ca62a3ea70f03da8dbd2e96a122a15a6a330700d613cd92e19578f8ec0a614b0f08a42365a

  • SSDEEP

    6144:Kwy+bnr+Np0yN90QEf4x9Aj0Ei6CieGSV/RhdhLkTUnN/Nq69:8Mrty90h4x9AoE0XGO/RhdhLk2NVr

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      ae3000814a659fd29e2169c17eb79809b38b62cdfde44c8de514aaa092c064bd

    • Size

      478KB

    • MD5

      fc231eb3e06720bd085c84b09be5683d

    • SHA1

      a5577ba53c19b3b928dfdad02a963db3c40dd9cb

    • SHA256

      ae3000814a659fd29e2169c17eb79809b38b62cdfde44c8de514aaa092c064bd

    • SHA512

      3c1076c9a52153d6d269fa6036ebb599d48fd7b3a17bbc70def544ca62a3ea70f03da8dbd2e96a122a15a6a330700d613cd92e19578f8ec0a614b0f08a42365a

    • SSDEEP

      6144:Kwy+bnr+Np0yN90QEf4x9Aj0Ei6CieGSV/RhdhLkTUnN/Nq69:8Mrty90h4x9AoE0XGO/RhdhLk2NVr

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks