General

  • Target

    e93649eeadfbf7af18907a556a260d4b24572c3749be643b2decb50edf0cc1c2

  • Size

    470KB

  • Sample

    241110-eellbsygkm

  • MD5

    c87654fa671de7b5802e7fb5986e38e6

  • SHA1

    d3570b3cd46eb3abfd0b5505859d17fa76e49c3e

  • SHA256

    e93649eeadfbf7af18907a556a260d4b24572c3749be643b2decb50edf0cc1c2

  • SHA512

    10f336dce8fdc62f3a2a13f7c0e95e7dbf159d96117c7c0476cf2908a7171d919259f3287cb79219b284acc90bde9a3c5492ef16b92be6e2c87bb5bdcf34280c

  • SSDEEP

    12288:LMrvy90us1ECjitkn+X+UW/D3x0WPN0J:IyrDCjW/uUWTRN0J

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      e93649eeadfbf7af18907a556a260d4b24572c3749be643b2decb50edf0cc1c2

    • Size

      470KB

    • MD5

      c87654fa671de7b5802e7fb5986e38e6

    • SHA1

      d3570b3cd46eb3abfd0b5505859d17fa76e49c3e

    • SHA256

      e93649eeadfbf7af18907a556a260d4b24572c3749be643b2decb50edf0cc1c2

    • SHA512

      10f336dce8fdc62f3a2a13f7c0e95e7dbf159d96117c7c0476cf2908a7171d919259f3287cb79219b284acc90bde9a3c5492ef16b92be6e2c87bb5bdcf34280c

    • SSDEEP

      12288:LMrvy90us1ECjitkn+X+UW/D3x0WPN0J:IyrDCjW/uUWTRN0J

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks