General

  • Target

    39771ddc1b2fc36def86a62560fe8eec36ae99d65d85bd83b4f9dcc79a3a9c67N.exe

  • Size

    501KB

  • Sample

    241111-wvlppsslc1

  • MD5

    4458f44b2844389a876d967516ba8604

  • SHA1

    acbdd14ef1f2390d7895b97d79d3b9371ff42861

  • SHA256

    ed5de0588a72f15c9501f4f6bfd2d8c04d4054c14cf31fc07beb399272dd3509

  • SHA512

    f81d61be3fa831c216cd23832792bab3762dfd15e9acecb0f66b68b0118e852ad3e9cd56b32803481f211863aa8f889d98afb982b189b9d31f8cccb5866608df

  • SSDEEP

    12288:kMrmy90m+gzCNctWsvs1ZXAIFavUrzFJ+rH:qyt+sCNccz1ZXXFFJ+rH

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      39771ddc1b2fc36def86a62560fe8eec36ae99d65d85bd83b4f9dcc79a3a9c67N.exe

    • Size

      501KB

    • MD5

      4458f44b2844389a876d967516ba8604

    • SHA1

      acbdd14ef1f2390d7895b97d79d3b9371ff42861

    • SHA256

      ed5de0588a72f15c9501f4f6bfd2d8c04d4054c14cf31fc07beb399272dd3509

    • SHA512

      f81d61be3fa831c216cd23832792bab3762dfd15e9acecb0f66b68b0118e852ad3e9cd56b32803481f211863aa8f889d98afb982b189b9d31f8cccb5866608df

    • SSDEEP

      12288:kMrmy90m+gzCNctWsvs1ZXAIFavUrzFJ+rH:qyt+sCNccz1ZXXFFJ+rH

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks