General

  • Target

    f004c6edbd60e771f9256042fd1fac6c10ac178c2116454294c8b06184c025ed

  • Size

    481KB

  • Sample

    241107-qdf51asgrj

  • MD5

    8a206273d3788702d2c67c5d1b972ad3

  • SHA1

    12bc14edf01b5a96e126c9240666ada4c5af8d36

  • SHA256

    f004c6edbd60e771f9256042fd1fac6c10ac178c2116454294c8b06184c025ed

  • SHA512

    b039573f0dfd6b764c89e88032c05e80cfe21e314c0428b4d217535ec79ac63af04eb7710a7a7b607a8a6ce231edb98604a488c742c91eb28d67c346015de2bf

  • SSDEEP

    6144:KYy+bnr+up0yN90QEl130bsHo+V9o42zO28OhKea5uGDiQu2c8HXEo4hGj:EMriy907msHo+V4zfhKemuTQu8N0G

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      f004c6edbd60e771f9256042fd1fac6c10ac178c2116454294c8b06184c025ed

    • Size

      481KB

    • MD5

      8a206273d3788702d2c67c5d1b972ad3

    • SHA1

      12bc14edf01b5a96e126c9240666ada4c5af8d36

    • SHA256

      f004c6edbd60e771f9256042fd1fac6c10ac178c2116454294c8b06184c025ed

    • SHA512

      b039573f0dfd6b764c89e88032c05e80cfe21e314c0428b4d217535ec79ac63af04eb7710a7a7b607a8a6ce231edb98604a488c742c91eb28d67c346015de2bf

    • SSDEEP

      6144:KYy+bnr+up0yN90QEl130bsHo+V9o42zO28OhKea5uGDiQu2c8HXEo4hGj:EMriy907msHo+V4zfhKemuTQu8N0G

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks