General

  • Target

    eb2b4b852b39216f39c1b321120cc48d0fd492827a3948f13d8f49c3675d759c

  • Size

    478KB

  • Sample

    241110-1j76savpcw

  • MD5

    096ddd7a5227112bc277fc1311c11917

  • SHA1

    785ae11aa005dd776302e575ad3a9cc6e3447ce8

  • SHA256

    eb2b4b852b39216f39c1b321120cc48d0fd492827a3948f13d8f49c3675d759c

  • SHA512

    e1b79846d72e30429a058e65d71c494fd20ea5fd1649522aa18d0204bd652384ca1d9ecd6f454d162af66717f0c5b90208d645473cf47f826e0c9bf74771cd52

  • SSDEEP

    12288:ZMrry90SBIBxjPijmebCQQL/AHVZOUANF:SypWBxjobvXHCUAD

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      eb2b4b852b39216f39c1b321120cc48d0fd492827a3948f13d8f49c3675d759c

    • Size

      478KB

    • MD5

      096ddd7a5227112bc277fc1311c11917

    • SHA1

      785ae11aa005dd776302e575ad3a9cc6e3447ce8

    • SHA256

      eb2b4b852b39216f39c1b321120cc48d0fd492827a3948f13d8f49c3675d759c

    • SHA512

      e1b79846d72e30429a058e65d71c494fd20ea5fd1649522aa18d0204bd652384ca1d9ecd6f454d162af66717f0c5b90208d645473cf47f826e0c9bf74771cd52

    • SSDEEP

      12288:ZMrry90SBIBxjPijmebCQQL/AHVZOUANF:SypWBxjobvXHCUAD

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks