General

  • Target

    25d43a9d559a06ddaa6b9cd89d8dc59ac40c4f5fcd98d4cfbc712737430b0735

  • Size

    470KB

  • Sample

    241110-spj25ssndn

  • MD5

    0ae472b2b323843780eb8774d1c45b39

  • SHA1

    29201db29643d979d1014cb4c927d15c34b7c9f3

  • SHA256

    25d43a9d559a06ddaa6b9cd89d8dc59ac40c4f5fcd98d4cfbc712737430b0735

  • SHA512

    df1b9cf4de01eed3a48efacaa3d4395fb561c06ccbdbc3d1711d136c3943eecf96cd76034e719dac8ef163bf03670d44b0e4a6e96dcc7e0234189aa51564ff26

  • SSDEEP

    12288:4MrHy90qK1xlsIjxtw1UaFduRgqiVhRq1HD50L9ap:vyNK1xlB+7P7qiVPqT0Jap

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      25d43a9d559a06ddaa6b9cd89d8dc59ac40c4f5fcd98d4cfbc712737430b0735

    • Size

      470KB

    • MD5

      0ae472b2b323843780eb8774d1c45b39

    • SHA1

      29201db29643d979d1014cb4c927d15c34b7c9f3

    • SHA256

      25d43a9d559a06ddaa6b9cd89d8dc59ac40c4f5fcd98d4cfbc712737430b0735

    • SHA512

      df1b9cf4de01eed3a48efacaa3d4395fb561c06ccbdbc3d1711d136c3943eecf96cd76034e719dac8ef163bf03670d44b0e4a6e96dcc7e0234189aa51564ff26

    • SSDEEP

      12288:4MrHy90qK1xlsIjxtw1UaFduRgqiVhRq1HD50L9ap:vyNK1xlB+7P7qiVPqT0Jap

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks