General

  • Target

    a0370759f9c138e59aba788e9f3b4db0b010d3e48e905316c49a717c59a85eec

  • Size

    482KB

  • Sample

    241110-av4pmavhqk

  • MD5

    d1da16d95c4831f729c43d395b399ca6

  • SHA1

    ed65caea7b913b05e4588eeefb3cc1bd08b938e6

  • SHA256

    a0370759f9c138e59aba788e9f3b4db0b010d3e48e905316c49a717c59a85eec

  • SHA512

    5eeb0f27091e41c153aa99ac2139c88292a6157c36d83a4b94198973ed37553e13db03518135fbd25ce830b263af21fba954fdfeb4739b2e121d89da6fee8acf

  • SSDEEP

    12288:TMruy90f3FbZTMU7u23J7R61JkMi8MYb9bl8n8:hy+VNYv23J01JkublM8

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      a0370759f9c138e59aba788e9f3b4db0b010d3e48e905316c49a717c59a85eec

    • Size

      482KB

    • MD5

      d1da16d95c4831f729c43d395b399ca6

    • SHA1

      ed65caea7b913b05e4588eeefb3cc1bd08b938e6

    • SHA256

      a0370759f9c138e59aba788e9f3b4db0b010d3e48e905316c49a717c59a85eec

    • SHA512

      5eeb0f27091e41c153aa99ac2139c88292a6157c36d83a4b94198973ed37553e13db03518135fbd25ce830b263af21fba954fdfeb4739b2e121d89da6fee8acf

    • SSDEEP

      12288:TMruy90f3FbZTMU7u23J7R61JkMi8MYb9bl8n8:hy+VNYv23J01JkublM8

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks