General

  • Target

    f20b6caf0f3f48993106a6246fce81cfa6b4ca1f59f4ef5e91b6e55d9c165152

  • Size

    478KB

  • Sample

    241105-xqc3fayrap

  • MD5

    ba7c54d6220b513dde4c1089e94b4bdd

  • SHA1

    c90c75b2edd58b8eefded5ff9229acc19b2e2b9d

  • SHA256

    f20b6caf0f3f48993106a6246fce81cfa6b4ca1f59f4ef5e91b6e55d9c165152

  • SHA512

    3fe6c49b50d6c442a7f76a73062b317092eacdb3c7f134197288728221de55aecea6b078f031e1a6ce5680b3cb2db671babac3299be16e509a69bf95ff1387c0

  • SSDEEP

    12288:iMrYy90eX8ypHsIEzEgNA7Id/AHTZLlHYgtmzw:2y18ypH6EFIKH1lHT6w

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      f20b6caf0f3f48993106a6246fce81cfa6b4ca1f59f4ef5e91b6e55d9c165152

    • Size

      478KB

    • MD5

      ba7c54d6220b513dde4c1089e94b4bdd

    • SHA1

      c90c75b2edd58b8eefded5ff9229acc19b2e2b9d

    • SHA256

      f20b6caf0f3f48993106a6246fce81cfa6b4ca1f59f4ef5e91b6e55d9c165152

    • SHA512

      3fe6c49b50d6c442a7f76a73062b317092eacdb3c7f134197288728221de55aecea6b078f031e1a6ce5680b3cb2db671babac3299be16e509a69bf95ff1387c0

    • SSDEEP

      12288:iMrYy90eX8ypHsIEzEgNA7Id/AHTZLlHYgtmzw:2y18ypH6EFIKH1lHT6w

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks