General

  • Target

    3e1b02d7e4291c1614b24f8da0065ac6523aa03c9d9530ab23b40d1715f0a339

  • Size

    427KB

  • Sample

    241106-k24y3sxdqa

  • MD5

    88192ec366d49ce1045799e8b3588ab9

  • SHA1

    7d6cd3a29abbd04e9a8487cde0a3f5aca31cf206

  • SHA256

    3e1b02d7e4291c1614b24f8da0065ac6523aa03c9d9530ab23b40d1715f0a339

  • SHA512

    d4d11b453ff1d7da7725c4fab6e475cc2fb2c3cc357bdd7dc1f10b356c0a0e7ab3a2176f79f5d2b4b17e740db1b9687eac63f4c217071261806acc81fc1a5dd5

  • SSDEEP

    12288:txM6IcEEyosBOsm7j5WSeX42NbvR7r/Tz2A:ELcEEDsBrmBA42tFT2A

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      60081851064ffef2f4af66c9a9ab0728f99bfcae4195ed8f35303e7f96f45dc2.exe

    • Size

      478KB

    • MD5

      9ee89d7bf9723030c887388e254173f7

    • SHA1

      cb71db3e6000f291eb83d3864fab548611f3d016

    • SHA256

      60081851064ffef2f4af66c9a9ab0728f99bfcae4195ed8f35303e7f96f45dc2

    • SHA512

      8ea0d9d7c540cd3c58337048e411108517c4f1f92ba135baf5ec4bf5a46bdc59c423d2b61b8ba065a94d0bb28b381abe9ae6479f6fee2a787ddaefa7f3e8b2d2

    • SSDEEP

      6144:KZy+bnr+lp0yN90QESRPoBHFQ3+U/sG5hPjZL34MhMvUurK0aZB3PH/JwuTkRkMp:TMrFy90jmuUEGnPjZH9Q1aZVX2KYp

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks