General

  • Target

    b9cd90c53a6dd32d67a0211e002d5d4b43b8a8ec4741208417df72704fa55e80

  • Size

    500KB

  • Sample

    241105-3r8tds1ekc

  • MD5

    9fc71b09740f9ffae9b729cb8b18186e

  • SHA1

    e5d17ccda6ba5c9a3941b88b2be193ab634a7872

  • SHA256

    b9cd90c53a6dd32d67a0211e002d5d4b43b8a8ec4741208417df72704fa55e80

  • SHA512

    05972f7cb05f181e4357b29d418308a013aae0702012a37f100ae6ae239fd34859d4a75a9ffb6be54d7a2eff1ea116308cb2671c829384698a6a31aa111fa1b7

  • SSDEEP

    12288:ZMrYy90bppvqxMltcwSRW/nipZgN2tSy:FyUp1k2tSW/4SuSy

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      b9cd90c53a6dd32d67a0211e002d5d4b43b8a8ec4741208417df72704fa55e80

    • Size

      500KB

    • MD5

      9fc71b09740f9ffae9b729cb8b18186e

    • SHA1

      e5d17ccda6ba5c9a3941b88b2be193ab634a7872

    • SHA256

      b9cd90c53a6dd32d67a0211e002d5d4b43b8a8ec4741208417df72704fa55e80

    • SHA512

      05972f7cb05f181e4357b29d418308a013aae0702012a37f100ae6ae239fd34859d4a75a9ffb6be54d7a2eff1ea116308cb2671c829384698a6a31aa111fa1b7

    • SSDEEP

      12288:ZMrYy90bppvqxMltcwSRW/nipZgN2tSy:FyUp1k2tSW/4SuSy

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks