General

  • Target

    2d047a36edfff25b2d375e5ab3185d6399f2c81a815790efc5faa477a26d41f3

  • Size

    501KB

  • Sample

    241107-hzp12axkgt

  • MD5

    d44712d77ce81899575fe32facab49cf

  • SHA1

    ad026074ebbb9fac346659290c0db5db2e272e4c

  • SHA256

    2d047a36edfff25b2d375e5ab3185d6399f2c81a815790efc5faa477a26d41f3

  • SHA512

    5f8cf59c50728865aac2067831751c6505e3d5aadc4303b0fe8604cdddb84f3efc37d6266e98b63021b47bc1dd21ecc42adcbd341b9e8c64900387ef100ade56

  • SSDEEP

    6144:KBy+bnr+ep0yN90QERQU/79ifWUvAZHWpTbRq2UM5aYANJdyyNw8PKbxhmBnpfgO:vMrOy907QIT6phFy7yWk2npLYBHa

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      2d047a36edfff25b2d375e5ab3185d6399f2c81a815790efc5faa477a26d41f3

    • Size

      501KB

    • MD5

      d44712d77ce81899575fe32facab49cf

    • SHA1

      ad026074ebbb9fac346659290c0db5db2e272e4c

    • SHA256

      2d047a36edfff25b2d375e5ab3185d6399f2c81a815790efc5faa477a26d41f3

    • SHA512

      5f8cf59c50728865aac2067831751c6505e3d5aadc4303b0fe8604cdddb84f3efc37d6266e98b63021b47bc1dd21ecc42adcbd341b9e8c64900387ef100ade56

    • SSDEEP

      6144:KBy+bnr+ep0yN90QERQU/79ifWUvAZHWpTbRq2UM5aYANJdyyNw8PKbxhmBnpfgO:vMrOy907QIT6phFy7yWk2npLYBHa

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks