General

  • Target

    ec2c87ff12b3eec7c464325397ac548ad97161bc112aa1f290c51f3877d56516

  • Size

    484KB

  • Sample

    241110-p4y8tszpck

  • MD5

    e75a63b653e68d7ee13cf6cb4469e295

  • SHA1

    bee3eb5be3305a286cdb29aa02b3f75f8a85ee67

  • SHA256

    ec2c87ff12b3eec7c464325397ac548ad97161bc112aa1f290c51f3877d56516

  • SHA512

    1576e0d6cfe76ca6d3785e9f9ffab03d613038ce720be34743807ba6f3552aed20d4d8cb1bca87bc7ee1c51701a5233bebb2425eabf8169c1f746a9e4ebe3c79

  • SSDEEP

    12288:0Mriy902O7DVWMzY4fQMwL022g/4wsjFPbs1Y:myyPVlzRfGLWe4Ls1Y

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      ec2c87ff12b3eec7c464325397ac548ad97161bc112aa1f290c51f3877d56516

    • Size

      484KB

    • MD5

      e75a63b653e68d7ee13cf6cb4469e295

    • SHA1

      bee3eb5be3305a286cdb29aa02b3f75f8a85ee67

    • SHA256

      ec2c87ff12b3eec7c464325397ac548ad97161bc112aa1f290c51f3877d56516

    • SHA512

      1576e0d6cfe76ca6d3785e9f9ffab03d613038ce720be34743807ba6f3552aed20d4d8cb1bca87bc7ee1c51701a5233bebb2425eabf8169c1f746a9e4ebe3c79

    • SSDEEP

      12288:0Mriy902O7DVWMzY4fQMwL022g/4wsjFPbs1Y:myyPVlzRfGLWe4Ls1Y

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks