General

  • Target

    1b48e9ba18aa97bb1378a40888701f62b969b71bf7952cc94fcf86b892f0e7de

  • Size

    724KB

  • Sample

    241110-dvmyna1pgl

  • MD5

    2f04e1ae2138dc97f6fde01c8133c9a4

  • SHA1

    d8eadc9c7ebcbaf0d8028d88ca62bd7d22989035

  • SHA256

    1b48e9ba18aa97bb1378a40888701f62b969b71bf7952cc94fcf86b892f0e7de

  • SHA512

    5eaae06e9fdbadefc937545ee7a24e89fc23cba0a9da97bd5189e1028458d46f5a1d051f2a8cb2e12c462a8bdc49812b001148be82555ab89e7cb5801e8895a4

  • SSDEEP

    12288:UMrNy90MdrqS0fVTAqnFYPy2Hf0NXGrnw0Qyo8A4gPiZwR0FkklNhPH:hynn0fVBFSYXGrn5zoPNSdPP

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      1b48e9ba18aa97bb1378a40888701f62b969b71bf7952cc94fcf86b892f0e7de

    • Size

      724KB

    • MD5

      2f04e1ae2138dc97f6fde01c8133c9a4

    • SHA1

      d8eadc9c7ebcbaf0d8028d88ca62bd7d22989035

    • SHA256

      1b48e9ba18aa97bb1378a40888701f62b969b71bf7952cc94fcf86b892f0e7de

    • SHA512

      5eaae06e9fdbadefc937545ee7a24e89fc23cba0a9da97bd5189e1028458d46f5a1d051f2a8cb2e12c462a8bdc49812b001148be82555ab89e7cb5801e8895a4

    • SSDEEP

      12288:UMrNy90MdrqS0fVTAqnFYPy2Hf0NXGrnw0Qyo8A4gPiZwR0FkklNhPH:hynn0fVBFSYXGrn5zoPNSdPP

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks