General

  • Target

    3c1e64062af2479ab101b7e563bc3f9d2ae7d5aa800ec54740323d4755890a20

  • Size

    479KB

  • Sample

    241109-y59wds1gpa

  • MD5

    d1451f8212c842d2858ea459019ae238

  • SHA1

    20e08e98dbe2319fa88dd1eb26c343e955cc421e

  • SHA256

    3c1e64062af2479ab101b7e563bc3f9d2ae7d5aa800ec54740323d4755890a20

  • SHA512

    34d73077e35743124b70d690cea8d5632133b8e0128a70e0aa5e3f784ae15fd74f1236da6b72d883eef21809cd404265d72bbbbbd6bbda93e14eb5d52c8f1117

  • SSDEEP

    12288:0Mrxy90VgA7taGVMCOvGSTJD1XlyW0c5GFsc7TsX2vSse:lyURZVMkSTnwNc5msszvSse

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      3c1e64062af2479ab101b7e563bc3f9d2ae7d5aa800ec54740323d4755890a20

    • Size

      479KB

    • MD5

      d1451f8212c842d2858ea459019ae238

    • SHA1

      20e08e98dbe2319fa88dd1eb26c343e955cc421e

    • SHA256

      3c1e64062af2479ab101b7e563bc3f9d2ae7d5aa800ec54740323d4755890a20

    • SHA512

      34d73077e35743124b70d690cea8d5632133b8e0128a70e0aa5e3f784ae15fd74f1236da6b72d883eef21809cd404265d72bbbbbd6bbda93e14eb5d52c8f1117

    • SSDEEP

      12288:0Mrxy90VgA7taGVMCOvGSTJD1XlyW0c5GFsc7TsX2vSse:lyURZVMkSTnwNc5msszvSse

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks