General

  • Target

    6e9e5cfee2dbda2e402250b2d32c64d0de6e2b7b4ac742fa6ecdaf618f8a261c

  • Size

    500KB

  • Sample

    241104-q8f4gstkcm

  • MD5

    e9eb829de0f712727625b0dcd189ef52

  • SHA1

    98e9ff706437769fbdae18a09910390d288b2f2c

  • SHA256

    6e9e5cfee2dbda2e402250b2d32c64d0de6e2b7b4ac742fa6ecdaf618f8a261c

  • SHA512

    5640f399414c09c8f2ecd88999c57bf685408312fb52bb08afa65306f768faafaab912473588cfc090447330dbb393d60396c8959ae95d4e3badf4230ca79757

  • SSDEEP

    6144:Kay+bnr+cp0yN90QE+g/t3MFQCZoyQd/44n2fHbthJfZRJtuwmZZTpTeacDApjek:CMrsy90gg/tcuPd/xnGzhncRpTe/Ad1

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      6e9e5cfee2dbda2e402250b2d32c64d0de6e2b7b4ac742fa6ecdaf618f8a261c

    • Size

      500KB

    • MD5

      e9eb829de0f712727625b0dcd189ef52

    • SHA1

      98e9ff706437769fbdae18a09910390d288b2f2c

    • SHA256

      6e9e5cfee2dbda2e402250b2d32c64d0de6e2b7b4ac742fa6ecdaf618f8a261c

    • SHA512

      5640f399414c09c8f2ecd88999c57bf685408312fb52bb08afa65306f768faafaab912473588cfc090447330dbb393d60396c8959ae95d4e3badf4230ca79757

    • SSDEEP

      6144:Kay+bnr+cp0yN90QE+g/t3MFQCZoyQd/44n2fHbthJfZRJtuwmZZTpTeacDApjek:CMrsy90gg/tcuPd/xnGzhncRpTe/Ad1

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks