General

  • Target

    155c06245605efc722178e5e880a5963e1bf692cbaf063a8ee38fc3cc4295363

  • Size

    538KB

  • Sample

    241117-df88cazcqj

  • MD5

    951e2db92b015d49fecfe9acfae847f2

  • SHA1

    fae8bde7557a504d5791b0953eb41cd7b2413e3c

  • SHA256

    155c06245605efc722178e5e880a5963e1bf692cbaf063a8ee38fc3cc4295363

  • SHA512

    8f6e24ea538b91dbd6610cd58540f00e7440263d35b8af49e4cd2f4b15c7950adb8047fff0eb4bbfd89ef1f1991c0dbef9e97cd39e0c927a9cba660e64a136d1

  • SSDEEP

    12288:OMr0y90KJOUVGsePQ3Wr6wHDXyye/n+ppj:yyPJVq1TjxA8pj

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      155c06245605efc722178e5e880a5963e1bf692cbaf063a8ee38fc3cc4295363

    • Size

      538KB

    • MD5

      951e2db92b015d49fecfe9acfae847f2

    • SHA1

      fae8bde7557a504d5791b0953eb41cd7b2413e3c

    • SHA256

      155c06245605efc722178e5e880a5963e1bf692cbaf063a8ee38fc3cc4295363

    • SHA512

      8f6e24ea538b91dbd6610cd58540f00e7440263d35b8af49e4cd2f4b15c7950adb8047fff0eb4bbfd89ef1f1991c0dbef9e97cd39e0c927a9cba660e64a136d1

    • SSDEEP

      12288:OMr0y90KJOUVGsePQ3Wr6wHDXyye/n+ppj:yyPJVq1TjxA8pj

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks