General

  • Target

    9cf7d471b1b58684483a890df120c5f9e879a189c3c9bb8ea71f32ae81c2a4ee

  • Size

    481KB

  • Sample

    241108-c85j7atdrm

  • MD5

    902723a8b1bb34619fcb676d6a7e7156

  • SHA1

    b85c2021e7f3f3f0875bbeb7fb70f1f0bb23c0a0

  • SHA256

    9cf7d471b1b58684483a890df120c5f9e879a189c3c9bb8ea71f32ae81c2a4ee

  • SHA512

    a410aeeb7f8a3b96dcedc5980e4d38195cfe0fad38fa4bf62d4020caa9f66df7e61c0798887547c55ecb32d049fdc30337bccaa14a4c4cfd7361f690a3969f81

  • SSDEEP

    6144:KBy+bnr+yp0yN90QESBe2p32vxv2PHZCuj/U9FTOMaeDuGDMQM2c8HXFtSo5z9WO:rMrOy90cpGvkHBDcFTW4uRQw8z5ZWSV

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      9cf7d471b1b58684483a890df120c5f9e879a189c3c9bb8ea71f32ae81c2a4ee

    • Size

      481KB

    • MD5

      902723a8b1bb34619fcb676d6a7e7156

    • SHA1

      b85c2021e7f3f3f0875bbeb7fb70f1f0bb23c0a0

    • SHA256

      9cf7d471b1b58684483a890df120c5f9e879a189c3c9bb8ea71f32ae81c2a4ee

    • SHA512

      a410aeeb7f8a3b96dcedc5980e4d38195cfe0fad38fa4bf62d4020caa9f66df7e61c0798887547c55ecb32d049fdc30337bccaa14a4c4cfd7361f690a3969f81

    • SSDEEP

      6144:KBy+bnr+yp0yN90QESBe2p32vxv2PHZCuj/U9FTOMaeDuGDMQM2c8HXFtSo5z9WO:rMrOy90cpGvkHBDcFTW4uRQw8z5ZWSV

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks