General

  • Target

    6e9eebf8336cb6d607795685ad054e90a492d7f5ef77c469fe4d7c4eb8836e04

  • Size

    500KB

  • Sample

    241108-149kca1dll

  • MD5

    d39a9f2eda16903129fa0c258553ad87

  • SHA1

    902524360c2c19db5013ea2b71b9501e0cf331f7

  • SHA256

    6e9eebf8336cb6d607795685ad054e90a492d7f5ef77c469fe4d7c4eb8836e04

  • SHA512

    b4af033e01db1d2f6f3b044886d0e3178d748083c548d0447cb0971ae6288992600ed8692677d03b1c9956508bccdc21775b873a3aaf2c97a8cb5d00d459eb36

  • SSDEEP

    6144:Kmy+bnr+Qp0yN90QEtqybGrKyccUkS8S2pIk12u/VtSQsr40IVO6cdleaWRavXcZ:+Mrcy90vqMAy8pUu/VItNIFavrO9Nf

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      6e9eebf8336cb6d607795685ad054e90a492d7f5ef77c469fe4d7c4eb8836e04

    • Size

      500KB

    • MD5

      d39a9f2eda16903129fa0c258553ad87

    • SHA1

      902524360c2c19db5013ea2b71b9501e0cf331f7

    • SHA256

      6e9eebf8336cb6d607795685ad054e90a492d7f5ef77c469fe4d7c4eb8836e04

    • SHA512

      b4af033e01db1d2f6f3b044886d0e3178d748083c548d0447cb0971ae6288992600ed8692677d03b1c9956508bccdc21775b873a3aaf2c97a8cb5d00d459eb36

    • SSDEEP

      6144:Kmy+bnr+Qp0yN90QEtqybGrKyccUkS8S2pIk12u/VtSQsr40IVO6cdleaWRavXcZ:+Mrcy90vqMAy8pUu/VItNIFavrO9Nf

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks