General

  • Target

    81e02bbc06f3bd176e259639b49089b6da836cffba81af69619bd9321ff8f183

  • Size

    482KB

  • Sample

    241110-cwlasawrh1

  • MD5

    fc17a8b8ca885cee5f5b38a0806a9fdb

  • SHA1

    ef9064de5a4f160a054098a3094b6b66ddc53668

  • SHA256

    81e02bbc06f3bd176e259639b49089b6da836cffba81af69619bd9321ff8f183

  • SHA512

    466ae5343c290b26fa2b21e9c461ecf746e8a00d21149ed08e66ceb9e7c444721442a7bd5d643e5a477191cb3db94ea962af725d6eae48189cbc30816428b8db

  • SSDEEP

    12288:AMrjy904VyGVKiEhvr0IkjhQ6ec54vdT5TP:TyjVlEhvQy6ec5ydTlP

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      81e02bbc06f3bd176e259639b49089b6da836cffba81af69619bd9321ff8f183

    • Size

      482KB

    • MD5

      fc17a8b8ca885cee5f5b38a0806a9fdb

    • SHA1

      ef9064de5a4f160a054098a3094b6b66ddc53668

    • SHA256

      81e02bbc06f3bd176e259639b49089b6da836cffba81af69619bd9321ff8f183

    • SHA512

      466ae5343c290b26fa2b21e9c461ecf746e8a00d21149ed08e66ceb9e7c444721442a7bd5d643e5a477191cb3db94ea962af725d6eae48189cbc30816428b8db

    • SSDEEP

      12288:AMrjy904VyGVKiEhvr0IkjhQ6ec54vdT5TP:TyjVlEhvQy6ec5ydTlP

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks