General

  • Target

    06b54ca1fb42d389faeb389ab53198926df179f1007660c0be8d328cee609726

  • Size

    470KB

  • Sample

    241105-1bz57s1pfr

  • MD5

    202feaa8c225954fac9ddf01565fe2c6

  • SHA1

    7e038d1d99b96b65e5237c104ca2d26c6240239f

  • SHA256

    06b54ca1fb42d389faeb389ab53198926df179f1007660c0be8d328cee609726

  • SHA512

    8a5d8478e2bfbf64f1b6ab8eaef96c1bbcb1ca31b9312508d51bf0acb80a56a91f88303cd1b41b07ea1c360dc49d48a7b31863fb0aeab9dcf3485e10eed75566

  • SSDEEP

    12288:GMrHy90Si9KS0ToEOO2OlsF4vDW/D3xMWPRh:5yw9KS0T5l2EwoDWTBRh

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      06b54ca1fb42d389faeb389ab53198926df179f1007660c0be8d328cee609726

    • Size

      470KB

    • MD5

      202feaa8c225954fac9ddf01565fe2c6

    • SHA1

      7e038d1d99b96b65e5237c104ca2d26c6240239f

    • SHA256

      06b54ca1fb42d389faeb389ab53198926df179f1007660c0be8d328cee609726

    • SHA512

      8a5d8478e2bfbf64f1b6ab8eaef96c1bbcb1ca31b9312508d51bf0acb80a56a91f88303cd1b41b07ea1c360dc49d48a7b31863fb0aeab9dcf3485e10eed75566

    • SSDEEP

      12288:GMrHy90Si9KS0ToEOO2OlsF4vDW/D3xMWPRh:5yw9KS0T5l2EwoDWTBRh

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks