General

  • Target

    60fb11b8733def6a840f1f22bccc4474458811b3ec0a002bc45c506817cc91ca

  • Size

    500KB

  • Sample

    241106-kreansxfmj

  • MD5

    621113eee263410bc30a12bd92c0e9b1

  • SHA1

    a144b4e892d0026ad5dc0f7d5d457fb9c6d8d696

  • SHA256

    60fb11b8733def6a840f1f22bccc4474458811b3ec0a002bc45c506817cc91ca

  • SHA512

    fda409e9b4b893f6b8b171c82c06e7947b88cbc78127485b2701eb9bef1ae87a94d7f067fa4b0daa0efe98036f683ba5b0d806282b3ffe602a8e7ee582e2ecff

  • SSDEEP

    12288:cMray90kjiVOtEuIVX5m5vKyNsSYC81g:OyV+qlOJw6nC81g

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      60fb11b8733def6a840f1f22bccc4474458811b3ec0a002bc45c506817cc91ca

    • Size

      500KB

    • MD5

      621113eee263410bc30a12bd92c0e9b1

    • SHA1

      a144b4e892d0026ad5dc0f7d5d457fb9c6d8d696

    • SHA256

      60fb11b8733def6a840f1f22bccc4474458811b3ec0a002bc45c506817cc91ca

    • SHA512

      fda409e9b4b893f6b8b171c82c06e7947b88cbc78127485b2701eb9bef1ae87a94d7f067fa4b0daa0efe98036f683ba5b0d806282b3ffe602a8e7ee582e2ecff

    • SSDEEP

      12288:cMray90kjiVOtEuIVX5m5vKyNsSYC81g:OyV+qlOJw6nC81g

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks