General

  • Target

    ef140f9597637874696612d670072c3bf87857c1d160bb1e12a7f85dae8d3723

  • Size

    500KB

  • Sample

    241110-lr276sxnak

  • MD5

    8b642c3708b8cc7e4cd6005762b17260

  • SHA1

    9cca95543b49a8b2d9005d1549f60e289d274ebb

  • SHA256

    ef140f9597637874696612d670072c3bf87857c1d160bb1e12a7f85dae8d3723

  • SHA512

    4b446551c547b371f488dcc1b568d292b4786c5831b357f12a38c361ea9f4cf392b06de27aa5b5938a9a4c1ba7cf9d95eb155865bfd0ef5eb9f682387f5c2641

  • SSDEEP

    12288:nMrTy90p+8/VseEi07qMhNKFDPoW/Ti1Cgr4Sk8Yn:0y1iVaPLcDAW/wl48Yn

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      ef140f9597637874696612d670072c3bf87857c1d160bb1e12a7f85dae8d3723

    • Size

      500KB

    • MD5

      8b642c3708b8cc7e4cd6005762b17260

    • SHA1

      9cca95543b49a8b2d9005d1549f60e289d274ebb

    • SHA256

      ef140f9597637874696612d670072c3bf87857c1d160bb1e12a7f85dae8d3723

    • SHA512

      4b446551c547b371f488dcc1b568d292b4786c5831b357f12a38c361ea9f4cf392b06de27aa5b5938a9a4c1ba7cf9d95eb155865bfd0ef5eb9f682387f5c2641

    • SSDEEP

      12288:nMrTy90p+8/VseEi07qMhNKFDPoW/Ti1Cgr4Sk8Yn:0y1iVaPLcDAW/wl48Yn

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks