General

  • Target

    44a05263bf8cbdd9a903daa36880372edd4d0715b52f177206f4643a12cafacf

  • Size

    471KB

  • Sample

    241110-xqabjswmcn

  • MD5

    e8fd64e7342978213b755036dd3d2cd7

  • SHA1

    ad37c35ec09467ff2560020b53fadb785e006faa

  • SHA256

    44a05263bf8cbdd9a903daa36880372edd4d0715b52f177206f4643a12cafacf

  • SHA512

    b806f745b28f7d68278ac1e2d481a094282f2b0fc8d924496db8f965e669eed947619a5a43435e775191925ab7281edc01b32b5e5c5f2df28f12b9f1ad776bc3

  • SSDEEP

    12288:vMrPy90rf7dFaTWh6kYfPDsy250AyHeOnP:cyY6TWhGHDOw+sP

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      44a05263bf8cbdd9a903daa36880372edd4d0715b52f177206f4643a12cafacf

    • Size

      471KB

    • MD5

      e8fd64e7342978213b755036dd3d2cd7

    • SHA1

      ad37c35ec09467ff2560020b53fadb785e006faa

    • SHA256

      44a05263bf8cbdd9a903daa36880372edd4d0715b52f177206f4643a12cafacf

    • SHA512

      b806f745b28f7d68278ac1e2d481a094282f2b0fc8d924496db8f965e669eed947619a5a43435e775191925ab7281edc01b32b5e5c5f2df28f12b9f1ad776bc3

    • SSDEEP

      12288:vMrPy90rf7dFaTWh6kYfPDsy250AyHeOnP:cyY6TWhGHDOw+sP

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks