General

  • Target

    f13d747f38cfb16fcc34de9226d0a2031260669787e01595140347c03383ffc9

  • Size

    482KB

  • Sample

    241104-3sg23azdrh

  • MD5

    f7298cdce21a966bdecbab29b599149c

  • SHA1

    1256ca2f252442445729d52d06b2bdf874d425dd

  • SHA256

    f13d747f38cfb16fcc34de9226d0a2031260669787e01595140347c03383ffc9

  • SHA512

    ea98f0ffd7224eab2d3901d978261fdd4b4ed3e34e40314929643dd3bd8abf80fb1acbb344e220cc7ee4dd2a7570dede47309b52af9be56cf652b0b840f14a3d

  • SSDEEP

    12288:pMr0y90yREBxjhM9fE7Ao+E1ckMi8RYb9U31N:ZykBxjhM9fLo+E1ckNUFN

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      f13d747f38cfb16fcc34de9226d0a2031260669787e01595140347c03383ffc9

    • Size

      482KB

    • MD5

      f7298cdce21a966bdecbab29b599149c

    • SHA1

      1256ca2f252442445729d52d06b2bdf874d425dd

    • SHA256

      f13d747f38cfb16fcc34de9226d0a2031260669787e01595140347c03383ffc9

    • SHA512

      ea98f0ffd7224eab2d3901d978261fdd4b4ed3e34e40314929643dd3bd8abf80fb1acbb344e220cc7ee4dd2a7570dede47309b52af9be56cf652b0b840f14a3d

    • SSDEEP

      12288:pMr0y90yREBxjhM9fE7Ao+E1ckMi8RYb9U31N:ZykBxjhM9fLo+E1ckNUFN

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks