General

  • Target

    6b408bd1e90fbbfcab6bf7b6d3ce4295df96a7d25750d4279c6fcbee4ae05ffd

  • Size

    501KB

  • Sample

    241107-ne4atazrdx

  • MD5

    d189be00c6017f6b5733c29fd7d48dde

  • SHA1

    2c980caba87ceeea0321517216462129488d8d7d

  • SHA256

    6b408bd1e90fbbfcab6bf7b6d3ce4295df96a7d25750d4279c6fcbee4ae05ffd

  • SHA512

    ab91caad1f981284aa1c25949a9a900222f58c43023e9a0502a07fd39dadac8cc07dd992670af09f350ec072488249a8a48fe9e6c0792f8417cb69919ae4de9d

  • SSDEEP

    12288:jMr8y90lQJFOVG99Nn1Hp8EKz7yP/2nCvIa1:HykUsVGbN5De7yP/6s

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      6b408bd1e90fbbfcab6bf7b6d3ce4295df96a7d25750d4279c6fcbee4ae05ffd

    • Size

      501KB

    • MD5

      d189be00c6017f6b5733c29fd7d48dde

    • SHA1

      2c980caba87ceeea0321517216462129488d8d7d

    • SHA256

      6b408bd1e90fbbfcab6bf7b6d3ce4295df96a7d25750d4279c6fcbee4ae05ffd

    • SHA512

      ab91caad1f981284aa1c25949a9a900222f58c43023e9a0502a07fd39dadac8cc07dd992670af09f350ec072488249a8a48fe9e6c0792f8417cb69919ae4de9d

    • SSDEEP

      12288:jMr8y90lQJFOVG99Nn1Hp8EKz7yP/2nCvIa1:HykUsVGbN5De7yP/6s

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks