General

  • Target

    061b945ed141fbfb2aee34d5b380bf0ba583762195220c3e0f4fff03a28026c5

  • Size

    482KB

  • Sample

    241105-plnz5szpgv

  • MD5

    a9808277e4698df2cf754d2dc01e9812

  • SHA1

    5784cb0bcdf17b3d407aa2bcec019a4249edb2c9

  • SHA256

    061b945ed141fbfb2aee34d5b380bf0ba583762195220c3e0f4fff03a28026c5

  • SHA512

    04991894f74b1928ab47dc4d129dc7eecd974562f5004491b869b8973d8259bed7d78345c36c770e6e704413bec5440abdfe5ea8cf929f61f5c410d37bbcb921

  • SSDEEP

    12288:+Mrey90wRtomO+1YpIb6x5i3vLhQ6ec5gVdTvs1F:sydiN+1YpImXyC6ec5adTs

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      061b945ed141fbfb2aee34d5b380bf0ba583762195220c3e0f4fff03a28026c5

    • Size

      482KB

    • MD5

      a9808277e4698df2cf754d2dc01e9812

    • SHA1

      5784cb0bcdf17b3d407aa2bcec019a4249edb2c9

    • SHA256

      061b945ed141fbfb2aee34d5b380bf0ba583762195220c3e0f4fff03a28026c5

    • SHA512

      04991894f74b1928ab47dc4d129dc7eecd974562f5004491b869b8973d8259bed7d78345c36c770e6e704413bec5440abdfe5ea8cf929f61f5c410d37bbcb921

    • SSDEEP

      12288:+Mrey90wRtomO+1YpIb6x5i3vLhQ6ec5gVdTvs1F:sydiN+1YpImXyC6ec5adTs

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks