General

  • Target

    deb00c8ba06752f444b647e3288e157206b12c9c829370aabf47950ab31522b1N

  • Size

    556KB

  • Sample

    241110-v43h5s1kf1

  • MD5

    fe59f32880f91b365a06b967e470b610

  • SHA1

    5491e8261475180ffaf1adce5ea1fe73f789ccc2

  • SHA256

    deb00c8ba06752f444b647e3288e157206b12c9c829370aabf47950ab31522b1

  • SHA512

    8310262ffd1d20e0ce2e5b34d89b8aacb9979fca2d376a96550c09440ed6f90f18d7739200cd9b6b73b967e1ae9ad9ae3f8663e9b60b55fd1b611f894ca2bdf8

  • SSDEEP

    12288:JMr/y90+mfJ1Gm/jT+Sd1CauWDQWV1dY1dtxZUsPpXyVol4:+yGfjG4jTdHhuWDQcfa6smol4

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      deb00c8ba06752f444b647e3288e157206b12c9c829370aabf47950ab31522b1N

    • Size

      556KB

    • MD5

      fe59f32880f91b365a06b967e470b610

    • SHA1

      5491e8261475180ffaf1adce5ea1fe73f789ccc2

    • SHA256

      deb00c8ba06752f444b647e3288e157206b12c9c829370aabf47950ab31522b1

    • SHA512

      8310262ffd1d20e0ce2e5b34d89b8aacb9979fca2d376a96550c09440ed6f90f18d7739200cd9b6b73b967e1ae9ad9ae3f8663e9b60b55fd1b611f894ca2bdf8

    • SSDEEP

      12288:JMr/y90+mfJ1Gm/jT+Sd1CauWDQWV1dY1dtxZUsPpXyVol4:+yGfjG4jTdHhuWDQcfa6smol4

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks