General

  • Target

    0df15d9ea79dc5727aa0350afb49e67a7821ed761301d69aa04626d56cc7882f

  • Size

    471KB

  • Sample

    241104-3dtsbazbqa

  • MD5

    917ba14766bd1515a3da49fddf1b5a6e

  • SHA1

    cb16c2243a55e7c749a14dba510f8e6e0fec786c

  • SHA256

    0df15d9ea79dc5727aa0350afb49e67a7821ed761301d69aa04626d56cc7882f

  • SHA512

    96c6ec9526b7a2c9e726f1f18ec3f39afc997845b563afe087c63ce4dcc331823e946b15506821324a46c0cd1a179ba104732048b5e5f676d87eeef28f3d646c

  • SSDEEP

    12288:AMrHy908SeBRz8Ah9sWplD9ARvITzwD84Wc:3yb5vzhCWplRQwTsd

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      0df15d9ea79dc5727aa0350afb49e67a7821ed761301d69aa04626d56cc7882f

    • Size

      471KB

    • MD5

      917ba14766bd1515a3da49fddf1b5a6e

    • SHA1

      cb16c2243a55e7c749a14dba510f8e6e0fec786c

    • SHA256

      0df15d9ea79dc5727aa0350afb49e67a7821ed761301d69aa04626d56cc7882f

    • SHA512

      96c6ec9526b7a2c9e726f1f18ec3f39afc997845b563afe087c63ce4dcc331823e946b15506821324a46c0cd1a179ba104732048b5e5f676d87eeef28f3d646c

    • SSDEEP

      12288:AMrHy908SeBRz8Ah9sWplD9ARvITzwD84Wc:3yb5vzhCWplRQwTsd

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks