General

  • Target

    a3b5e22aeb1cafbca939ad31ecce07c99bb87bdab4660146ccb3da5d3087d48d.exe

  • Size

    366KB

  • Sample

    241112-1ezc3ssanp

  • MD5

    4f638f3a3b80a8a1edaa6e48da09403a

  • SHA1

    46e29ac6af6c1b8d69856d95639194bb5698750a

  • SHA256

    a3b5e22aeb1cafbca939ad31ecce07c99bb87bdab4660146ccb3da5d3087d48d

  • SHA512

    174dc415e7bee36f0886dd713027722871de3c3da82d4c1c906d35712d2e2f76b669c066b47a97b81d910bb05edd2d382cabd2b7ce17230f46d160c2bc5b2cff

  • SSDEEP

    6144:KXy+bnr+pp0yN90QES5EtlkjZHluB4M/iCDT8w+eb+aEHCZm8aCkQivN9f:dMrFy90hQjGF/L3pZWrxPf

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      a3b5e22aeb1cafbca939ad31ecce07c99bb87bdab4660146ccb3da5d3087d48d.exe

    • Size

      366KB

    • MD5

      4f638f3a3b80a8a1edaa6e48da09403a

    • SHA1

      46e29ac6af6c1b8d69856d95639194bb5698750a

    • SHA256

      a3b5e22aeb1cafbca939ad31ecce07c99bb87bdab4660146ccb3da5d3087d48d

    • SHA512

      174dc415e7bee36f0886dd713027722871de3c3da82d4c1c906d35712d2e2f76b669c066b47a97b81d910bb05edd2d382cabd2b7ce17230f46d160c2bc5b2cff

    • SSDEEP

      6144:KXy+bnr+pp0yN90QES5EtlkjZHluB4M/iCDT8w+eb+aEHCZm8aCkQivN9f:dMrFy90hQjGF/L3pZWrxPf

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks