General

  • Target

    e195bac062de9e2bf8a8a31c1cec29e55b1373d63faf8de3ddbb3daf640c8ed5

  • Size

    478KB

  • Sample

    241110-a8zb3aymgm

  • MD5

    dc130d950dcffd72d6c534781751bfce

  • SHA1

    1bf9cb6064984d68be4c554613a73bbce76d6efb

  • SHA256

    e195bac062de9e2bf8a8a31c1cec29e55b1373d63faf8de3ddbb3daf640c8ed5

  • SHA512

    4b30eca8ff5feaf3c49e9e305d3801be521f8b4df80432b1663fd64e5a7bae9e8884b428918010aa0ed2f57213a8e244c51aaf7ac3ee1450c4e30eaaf41222c0

  • SSDEEP

    12288:NMrvy90stLDJSVRj7rxwqm0Uj1HKRmTz72ZvO:WypCVR12bdKATHmvO

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      e195bac062de9e2bf8a8a31c1cec29e55b1373d63faf8de3ddbb3daf640c8ed5

    • Size

      478KB

    • MD5

      dc130d950dcffd72d6c534781751bfce

    • SHA1

      1bf9cb6064984d68be4c554613a73bbce76d6efb

    • SHA256

      e195bac062de9e2bf8a8a31c1cec29e55b1373d63faf8de3ddbb3daf640c8ed5

    • SHA512

      4b30eca8ff5feaf3c49e9e305d3801be521f8b4df80432b1663fd64e5a7bae9e8884b428918010aa0ed2f57213a8e244c51aaf7ac3ee1450c4e30eaaf41222c0

    • SSDEEP

      12288:NMrvy90stLDJSVRj7rxwqm0Uj1HKRmTz72ZvO:WypCVR12bdKATHmvO

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks