General

  • Target

    0dfa9193449001c33d6875d11a6247af62b2306bea53b27921f89ca036d9566d

  • Size

    478KB

  • Sample

    241105-dzcngswlfl

  • MD5

    cdcca139f13b1a0f9440b9a5f955749b

  • SHA1

    6f1c405376f9a908f9db42154157be754fcdbda2

  • SHA256

    0dfa9193449001c33d6875d11a6247af62b2306bea53b27921f89ca036d9566d

  • SHA512

    5bb0dcdab81ef3857f91b6b504de5327bc730004186365edd79b022198bfca08b81597820f9c9c7873736577579671b108c210baceb82818148301cb8b98ef9f

  • SSDEEP

    6144:KUy+bnr+pp0yN90QE/6jL4E1Y7DQ6WTiMXuzBiI4p65Pktp08jobMygBZNLql+:EMrty90SuDQjq5pxktGoZNs+

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      0dfa9193449001c33d6875d11a6247af62b2306bea53b27921f89ca036d9566d

    • Size

      478KB

    • MD5

      cdcca139f13b1a0f9440b9a5f955749b

    • SHA1

      6f1c405376f9a908f9db42154157be754fcdbda2

    • SHA256

      0dfa9193449001c33d6875d11a6247af62b2306bea53b27921f89ca036d9566d

    • SHA512

      5bb0dcdab81ef3857f91b6b504de5327bc730004186365edd79b022198bfca08b81597820f9c9c7873736577579671b108c210baceb82818148301cb8b98ef9f

    • SSDEEP

      6144:KUy+bnr+pp0yN90QE/6jL4E1Y7DQ6WTiMXuzBiI4p65Pktp08jobMygBZNLql+:EMrty90SuDQjq5pxktGoZNs+

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks