General

  • Target

    ee04bfbe9d602bca71fe140d44cc460f6161526dc393e7562ddb967d77aa8159

  • Size

    743KB

  • Sample

    241114-ekae9avalb

  • MD5

    be1063d085394d1f5a9e1863a9174956

  • SHA1

    86bb7a6c3f4d1ed1633c0ec30f21373f777d0d23

  • SHA256

    ee04bfbe9d602bca71fe140d44cc460f6161526dc393e7562ddb967d77aa8159

  • SHA512

    526822a497233f301d225ae0507e2d46dc30cc0a1b43e43c3f23825bf306a35ad2e87de08b6a9ff58b1edc7c3d0191e677ebcd071cc857ac196e07c4d2cd74b6

  • SSDEEP

    12288:tMrry90tt22QG0BClrDYX4cInSVXEaAIK/UJdCF38acFx2Kxd/nRtB4EK8PLlhoG:6y4LtOClr8a5aEsE3xcT2Cd/PKGpho8/

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      ee04bfbe9d602bca71fe140d44cc460f6161526dc393e7562ddb967d77aa8159

    • Size

      743KB

    • MD5

      be1063d085394d1f5a9e1863a9174956

    • SHA1

      86bb7a6c3f4d1ed1633c0ec30f21373f777d0d23

    • SHA256

      ee04bfbe9d602bca71fe140d44cc460f6161526dc393e7562ddb967d77aa8159

    • SHA512

      526822a497233f301d225ae0507e2d46dc30cc0a1b43e43c3f23825bf306a35ad2e87de08b6a9ff58b1edc7c3d0191e677ebcd071cc857ac196e07c4d2cd74b6

    • SSDEEP

      12288:tMrry90tt22QG0BClrDYX4cInSVXEaAIK/UJdCF38acFx2Kxd/nRtB4EK8PLlhoG:6y4LtOClr8a5aEsE3xcT2Cd/PKGpho8/

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks