General

  • Target

    9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119

  • Size

    477KB

  • Sample

    241111-aeytfaxmdy

  • MD5

    aa7b3fe90b2d477b5db2afa25388554d

  • SHA1

    67da7669d32ada781633e2e347f369ad090b1dbb

  • SHA256

    9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119

  • SHA512

    f7bd5c45583545edd171bfcf91ebef189d8f101851e8f22966b565aaf78551d7be560742908f43252659c98fa31d30888662a80ccdbfa5e7a190a61009da2f0f

  • SSDEEP

    6144:KCy+bnr+vp0yN90QE3PKapC3UBzsDY+4CbYfIHSkY7Vt19IqoAHNxb0K48rVBhSc:KMr3y90kapxAXSkWV7GT24YKs

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Targets

    • Target

      9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119

    • Size

      477KB

    • MD5

      aa7b3fe90b2d477b5db2afa25388554d

    • SHA1

      67da7669d32ada781633e2e347f369ad090b1dbb

    • SHA256

      9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119

    • SHA512

      f7bd5c45583545edd171bfcf91ebef189d8f101851e8f22966b565aaf78551d7be560742908f43252659c98fa31d30888662a80ccdbfa5e7a190a61009da2f0f

    • SSDEEP

      6144:KCy+bnr+vp0yN90QE3PKapC3UBzsDY+4CbYfIHSkY7Vt19IqoAHNxb0K48rVBhSc:KMr3y90kapxAXSkWV7GT24YKs

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks