General

  • Target

    70ff5c7e956b068a83ce80fc31bfb86c1910addeaa440b531b4aae3d0a2f73c7

  • Size

    726KB

  • Sample

    241105-c2575ssfla

  • MD5

    b6373c991db44a13ddce2cac8145c302

  • SHA1

    40a6e3fb19eadf5dc905ab8251f092e1982ff344

  • SHA256

    70ff5c7e956b068a83ce80fc31bfb86c1910addeaa440b531b4aae3d0a2f73c7

  • SHA512

    b72c4a488a315cb3a2cd4ec8cd9111f6943465e817d418c7a9bf42362b3aa64b80268fdaa5b0d479eeecf64f66c18d88626f0ebab2d7bb5929b26a8d165879e5

  • SSDEEP

    12288:vMrPy90/XeF1nPLTahStofEKLRCJNtg1NwnezwnGx6lsLzAVzXEL:MyOXeLnPvah7EoIK1NwZa/LzmTEL

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      70ff5c7e956b068a83ce80fc31bfb86c1910addeaa440b531b4aae3d0a2f73c7

    • Size

      726KB

    • MD5

      b6373c991db44a13ddce2cac8145c302

    • SHA1

      40a6e3fb19eadf5dc905ab8251f092e1982ff344

    • SHA256

      70ff5c7e956b068a83ce80fc31bfb86c1910addeaa440b531b4aae3d0a2f73c7

    • SHA512

      b72c4a488a315cb3a2cd4ec8cd9111f6943465e817d418c7a9bf42362b3aa64b80268fdaa5b0d479eeecf64f66c18d88626f0ebab2d7bb5929b26a8d165879e5

    • SSDEEP

      12288:vMrPy90/XeF1nPLTahStofEKLRCJNtg1NwnezwnGx6lsLzAVzXEL:MyOXeLnPvah7EoIK1NwZa/LzmTEL

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks