General

  • Target

    635a22985db779b36f214a3edbad69f332cbe346049fd6ed61995e15768cc8f6

  • Size

    471KB

  • Sample

    241111-lhg6msxdkp

  • MD5

    51183995acd59d54fb466b1f2328fd86

  • SHA1

    9ca74e77ca814ce35a81684f1bf932ad71438033

  • SHA256

    635a22985db779b36f214a3edbad69f332cbe346049fd6ed61995e15768cc8f6

  • SHA512

    bb424bc974c595bb870711b7cea4423c287fef11d8d5e1ff278a544a7f3e1ddbc5a88b4150ab0d6370e3dac1569418ae8a14f8b085b124ec03ebd8250df15ea8

  • SSDEEP

    12288:HMrFy90dxw1VtJPQYCzeIDE/ElD9Ah/ITzDDhtWP:eyFVtNQYKeIUElRYATHe

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      635a22985db779b36f214a3edbad69f332cbe346049fd6ed61995e15768cc8f6

    • Size

      471KB

    • MD5

      51183995acd59d54fb466b1f2328fd86

    • SHA1

      9ca74e77ca814ce35a81684f1bf932ad71438033

    • SHA256

      635a22985db779b36f214a3edbad69f332cbe346049fd6ed61995e15768cc8f6

    • SHA512

      bb424bc974c595bb870711b7cea4423c287fef11d8d5e1ff278a544a7f3e1ddbc5a88b4150ab0d6370e3dac1569418ae8a14f8b085b124ec03ebd8250df15ea8

    • SSDEEP

      12288:HMrFy90dxw1VtJPQYCzeIDE/ElD9Ah/ITzDDhtWP:eyFVtNQYKeIUElRYATHe

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks