General

  • Target

    9c087d9bdaa18fb3ca6a8f92d6102b613bee0d6af2d88aa83800098e2d141fe7

  • Size

    483KB

  • Sample

    241105-f7kp6sweqj

  • MD5

    069d6c69bdbc8ac562cebd9e1e941e0c

  • SHA1

    9840ef230ed5a1ac1290782a497a14e7ded53341

  • SHA256

    9c087d9bdaa18fb3ca6a8f92d6102b613bee0d6af2d88aa83800098e2d141fe7

  • SHA512

    7694447569900b0af58e6a3d8e3843c5c5e2e9b3de865208f6db433c1b117309c99ffe914d110a12d63108b3e3692158669a858759222dc3c61d42104e52abe8

  • SSDEEP

    12288:5MrMy90xAhuijCukEH9g9L02DgI4wsj4Ebbg:xyFwijCufHILjd4Kmg

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      9c087d9bdaa18fb3ca6a8f92d6102b613bee0d6af2d88aa83800098e2d141fe7

    • Size

      483KB

    • MD5

      069d6c69bdbc8ac562cebd9e1e941e0c

    • SHA1

      9840ef230ed5a1ac1290782a497a14e7ded53341

    • SHA256

      9c087d9bdaa18fb3ca6a8f92d6102b613bee0d6af2d88aa83800098e2d141fe7

    • SHA512

      7694447569900b0af58e6a3d8e3843c5c5e2e9b3de865208f6db433c1b117309c99ffe914d110a12d63108b3e3692158669a858759222dc3c61d42104e52abe8

    • SSDEEP

      12288:5MrMy90xAhuijCukEH9g9L02DgI4wsj4Ebbg:xyFwijCufHILjd4Kmg

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks