General

  • Target

    c6ca0304b773709c39587f87472708dbad62abb366a8c0a0dc08b01cff6cfe10

  • Size

    478KB

  • Sample

    241106-ke6t6axdnj

  • MD5

    adb6a609c1e8e4462c158a6247f926c4

  • SHA1

    894340f9fb7b339e8b77c1fdb85a5e936a3291ac

  • SHA256

    c6ca0304b773709c39587f87472708dbad62abb366a8c0a0dc08b01cff6cfe10

  • SHA512

    2515cc69b62ad49962ce12909a0da5fa8f0702f10e9b21ecdd6db834cdc4ac3797a155b9e0423ec09bbc6b1ed178dfecd00fc6071aa148fc1db9bab621f02c77

  • SSDEEP

    12288:MMr7y90FWXLxTXa0jQeQk7DD51xktJ6u7:ny/2QQhkl1eb7

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      c6ca0304b773709c39587f87472708dbad62abb366a8c0a0dc08b01cff6cfe10

    • Size

      478KB

    • MD5

      adb6a609c1e8e4462c158a6247f926c4

    • SHA1

      894340f9fb7b339e8b77c1fdb85a5e936a3291ac

    • SHA256

      c6ca0304b773709c39587f87472708dbad62abb366a8c0a0dc08b01cff6cfe10

    • SHA512

      2515cc69b62ad49962ce12909a0da5fa8f0702f10e9b21ecdd6db834cdc4ac3797a155b9e0423ec09bbc6b1ed178dfecd00fc6071aa148fc1db9bab621f02c77

    • SSDEEP

      12288:MMr7y90FWXLxTXa0jQeQk7DD51xktJ6u7:ny/2QQhkl1eb7

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks