General

  • Target

    70c51b1d0191d392b736270288a0663bb348c9cbcb1328d9df3b2cf7b91a5e7e

  • Size

    483KB

  • Sample

    241110-eksxlayhlk

  • MD5

    7a3f5238c0f9bf6dbb8cd279f4d2b8a8

  • SHA1

    509fd8222a80f277ff4ad1cb967a217adb51df57

  • SHA256

    70c51b1d0191d392b736270288a0663bb348c9cbcb1328d9df3b2cf7b91a5e7e

  • SHA512

    e7c40dee876a460195c33791d334d47b7ba383637073ce39857b6e5adddcec353767072d6d3f324d23c16ddd297ed04d264eacb18fce0568d0c95a04899b40bf

  • SSDEEP

    12288:4Mr9y90JOrVgSM0UoKgEL02ggt4wsjFlWe0:1yLVhUoKgELAY4Ll2

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      70c51b1d0191d392b736270288a0663bb348c9cbcb1328d9df3b2cf7b91a5e7e

    • Size

      483KB

    • MD5

      7a3f5238c0f9bf6dbb8cd279f4d2b8a8

    • SHA1

      509fd8222a80f277ff4ad1cb967a217adb51df57

    • SHA256

      70c51b1d0191d392b736270288a0663bb348c9cbcb1328d9df3b2cf7b91a5e7e

    • SHA512

      e7c40dee876a460195c33791d334d47b7ba383637073ce39857b6e5adddcec353767072d6d3f324d23c16ddd297ed04d264eacb18fce0568d0c95a04899b40bf

    • SSDEEP

      12288:4Mr9y90JOrVgSM0UoKgEL02ggt4wsjFlWe0:1yLVhUoKgELAY4Ll2

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks