General

  • Target

    0f52aae791f64c129743effebe97e45aee59828074f40fde9016a021964f2a1c

  • Size

    481KB

  • Sample

    241111-beyzwazaqd

  • MD5

    4bbe54e31b86673942ea5588d13fd29f

  • SHA1

    52f035cad56bb37bf2eb2e422db8fee3e92810aa

  • SHA256

    0f52aae791f64c129743effebe97e45aee59828074f40fde9016a021964f2a1c

  • SHA512

    a03a69bc65ea1cd6da78f5dcabc0e066729c8a2ca565aabeb72345096224995e6bf2b24de1a17f85bf0791dc350b44fff419f08e8da5e020a3b6d4fb16bdb168

  • SSDEEP

    6144:Kuy+bnr+sp0yN90QEqtal4PyTMSZrnl1zb9Cky2D6RQBuGD2QG2c8HXoiwegNok1:CMrky90Oq4WhL1CkyuuvQ28WykJd5

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      0f52aae791f64c129743effebe97e45aee59828074f40fde9016a021964f2a1c

    • Size

      481KB

    • MD5

      4bbe54e31b86673942ea5588d13fd29f

    • SHA1

      52f035cad56bb37bf2eb2e422db8fee3e92810aa

    • SHA256

      0f52aae791f64c129743effebe97e45aee59828074f40fde9016a021964f2a1c

    • SHA512

      a03a69bc65ea1cd6da78f5dcabc0e066729c8a2ca565aabeb72345096224995e6bf2b24de1a17f85bf0791dc350b44fff419f08e8da5e020a3b6d4fb16bdb168

    • SSDEEP

      6144:Kuy+bnr+sp0yN90QEqtal4PyTMSZrnl1zb9Cky2D6RQBuGD2QG2c8HXoiwegNok1:CMrky90Oq4WhL1CkyuuvQ28WykJd5

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks