General

  • Target

    448c28e2faa45f387755cfe340014514316f5a9f668e73bf38b0c2c4c0180cce

  • Size

    470KB

  • Sample

    241106-klq3aawmbw

  • MD5

    1ea1b41339a14b2f258c777395342093

  • SHA1

    d73853d898c38ede8cfaedc9c0f24363e84e4b89

  • SHA256

    448c28e2faa45f387755cfe340014514316f5a9f668e73bf38b0c2c4c0180cce

  • SHA512

    e6260bc1c56c1a1624565f3c429b786241eff17140f7262bfce908a9b4dc6dea3532995e627cce58e4ee51c62b9a959735f146ff09ecd6ef1745d9a6a47de7bf

  • SSDEEP

    6144:Kjy+bnr+5p0yN90QEgzdgxciH6xiTsenseWX3yapczPJw4u8V+HkVbaeK2XIi:dMr1y902CH6xKseHc3yapczPJQE8MXB

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      448c28e2faa45f387755cfe340014514316f5a9f668e73bf38b0c2c4c0180cce

    • Size

      470KB

    • MD5

      1ea1b41339a14b2f258c777395342093

    • SHA1

      d73853d898c38ede8cfaedc9c0f24363e84e4b89

    • SHA256

      448c28e2faa45f387755cfe340014514316f5a9f668e73bf38b0c2c4c0180cce

    • SHA512

      e6260bc1c56c1a1624565f3c429b786241eff17140f7262bfce908a9b4dc6dea3532995e627cce58e4ee51c62b9a959735f146ff09ecd6ef1745d9a6a47de7bf

    • SSDEEP

      6144:Kjy+bnr+5p0yN90QEgzdgxciH6xiTsenseWX3yapczPJw4u8V+HkVbaeK2XIi:dMr1y902CH6xKseHc3yapczPJQE8MXB

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks