General

  • Target

    57f1ff91059636f191a664bb35a2de54d2e271c341b642a82c6d26e4438c8b2f

  • Size

    471KB

  • Sample

    241110-aake9avfkg

  • MD5

    385dbb1fb4fc92ad2bfdc0d7d0ed4fc3

  • SHA1

    c58a632c3ca93e865c0497f5c955341d49856ed6

  • SHA256

    57f1ff91059636f191a664bb35a2de54d2e271c341b642a82c6d26e4438c8b2f

  • SHA512

    c17df0bd05a61f98cc43a05c307bcb5d1ebee643a058d3ac5c000a5a16bbb0cb890546b192abcee3452ca35674e3ea781ba89c390e15a837d4b1e51eaaf361c4

  • SSDEEP

    12288:EMrLy90NDJtgha0TwkMSjD089lD9AxvITzsDE0WdYS:/yaDJtgha0TASjD0wlRwwTwjS

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      57f1ff91059636f191a664bb35a2de54d2e271c341b642a82c6d26e4438c8b2f

    • Size

      471KB

    • MD5

      385dbb1fb4fc92ad2bfdc0d7d0ed4fc3

    • SHA1

      c58a632c3ca93e865c0497f5c955341d49856ed6

    • SHA256

      57f1ff91059636f191a664bb35a2de54d2e271c341b642a82c6d26e4438c8b2f

    • SHA512

      c17df0bd05a61f98cc43a05c307bcb5d1ebee643a058d3ac5c000a5a16bbb0cb890546b192abcee3452ca35674e3ea781ba89c390e15a837d4b1e51eaaf361c4

    • SSDEEP

      12288:EMrLy90NDJtgha0TwkMSjD089lD9AxvITzsDE0WdYS:/yaDJtgha0TASjD0wlRwwTwjS

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks