General

  • Target

    abe0d911273c33cc80e1fd2353206c022ca128d45e485f16cde0bd9c8ee61c47

  • Size

    478KB

  • Sample

    241110-f8vxja1cpb

  • MD5

    87d0f8209c784d8b514ac512998f25bf

  • SHA1

    82be5d34df215e7f4a6f7e3e1866aa12c6341c3d

  • SHA256

    abe0d911273c33cc80e1fd2353206c022ca128d45e485f16cde0bd9c8ee61c47

  • SHA512

    64024a1e685c9df1cf57721110c38039c80662d9511ff31478f04b494f126d18a38e7bc8eaec9a6f99cf280238adbbe5b13c7716e3f03ea135c083c75580dbfd

  • SSDEEP

    6144:Ksy+bnr+ep0yN90QEUnLAJAyUoV2oJkBAsKg0LQSFTFO/vUtYgudY4O6SKRmUY0k:MMr2y90+HoVkB+gSFs3Uj7FKRm4Z+5

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      abe0d911273c33cc80e1fd2353206c022ca128d45e485f16cde0bd9c8ee61c47

    • Size

      478KB

    • MD5

      87d0f8209c784d8b514ac512998f25bf

    • SHA1

      82be5d34df215e7f4a6f7e3e1866aa12c6341c3d

    • SHA256

      abe0d911273c33cc80e1fd2353206c022ca128d45e485f16cde0bd9c8ee61c47

    • SHA512

      64024a1e685c9df1cf57721110c38039c80662d9511ff31478f04b494f126d18a38e7bc8eaec9a6f99cf280238adbbe5b13c7716e3f03ea135c083c75580dbfd

    • SSDEEP

      6144:Ksy+bnr+ep0yN90QEUnLAJAyUoV2oJkBAsKg0LQSFTFO/vUtYgudY4O6SKRmUY0k:MMr2y90+HoVkB+gSFs3Uj7FKRm4Z+5

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks