General

  • Target

    660a089bb5a74d2b87f48eeca368d17e385f904fafe5d7f39a68673edc7e3fd6

  • Size

    724KB

  • Sample

    241110-jhfayawjbl

  • MD5

    6e10262338bc442ff464900283a217be

  • SHA1

    10688129c36314401f23d57c0e32641f4a89ee86

  • SHA256

    660a089bb5a74d2b87f48eeca368d17e385f904fafe5d7f39a68673edc7e3fd6

  • SHA512

    4ef8f527d196b6f7376b2d6c446942fdb1d37b121ecc76cd7433387cdfc5a74146cb9274b6c71230c11136e5d2feb4e87c6a73d54bc0e126d15e361fd4660f0c

  • SSDEEP

    12288:0MrDy90BJloOKi0ZYp3Yf1Xvi+LOr7lSjAagW+I5X8dk+bp186VYptok+TU:3yuJwi0o3Yf1q+WUjgKZ+bj83MU

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      660a089bb5a74d2b87f48eeca368d17e385f904fafe5d7f39a68673edc7e3fd6

    • Size

      724KB

    • MD5

      6e10262338bc442ff464900283a217be

    • SHA1

      10688129c36314401f23d57c0e32641f4a89ee86

    • SHA256

      660a089bb5a74d2b87f48eeca368d17e385f904fafe5d7f39a68673edc7e3fd6

    • SHA512

      4ef8f527d196b6f7376b2d6c446942fdb1d37b121ecc76cd7433387cdfc5a74146cb9274b6c71230c11136e5d2feb4e87c6a73d54bc0e126d15e361fd4660f0c

    • SSDEEP

      12288:0MrDy90BJloOKi0ZYp3Yf1Xvi+LOr7lSjAagW+I5X8dk+bp186VYptok+TU:3yuJwi0o3Yf1q+WUjgKZ+bj83MU

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks