General

  • Target

    44b9af7d1be473a95695279d0362372f7fa07b9ea9550cf22bee71c99ae447dc

  • Size

    483KB

  • Sample

    241111-lj6wdswqax

  • MD5

    98fdc2b0aee01204c80f65de177489ce

  • SHA1

    42988b19f3b4d0b2ff2275e46d0eb69095e54409

  • SHA256

    44b9af7d1be473a95695279d0362372f7fa07b9ea9550cf22bee71c99ae447dc

  • SHA512

    4ac5c5e6d59a7f65130af11ec2474f6dc3abf676d1b70b94b23b288b77f45ea48174f880c54b9c19036f44cd2dae3956af9b05e34ac2a7cac22dfa8c11d133f6

  • SSDEEP

    12288:2MrMy90xcfIH8F5Yz4Z7ps7YAw5n1SkwsDeEgml:OyffIcrYz+7pfAw5n1zJgml

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      44b9af7d1be473a95695279d0362372f7fa07b9ea9550cf22bee71c99ae447dc

    • Size

      483KB

    • MD5

      98fdc2b0aee01204c80f65de177489ce

    • SHA1

      42988b19f3b4d0b2ff2275e46d0eb69095e54409

    • SHA256

      44b9af7d1be473a95695279d0362372f7fa07b9ea9550cf22bee71c99ae447dc

    • SHA512

      4ac5c5e6d59a7f65130af11ec2474f6dc3abf676d1b70b94b23b288b77f45ea48174f880c54b9c19036f44cd2dae3956af9b05e34ac2a7cac22dfa8c11d133f6

    • SSDEEP

      12288:2MrMy90xcfIH8F5Yz4Z7ps7YAw5n1SkwsDeEgml:OyffIcrYz+7pfAw5n1zJgml

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks