General

  • Target

    6ffb73495d5f0c6f895c4426ac7213abc94e5fae8e25ecd70fa4c832248fd57e

  • Size

    470KB

  • Sample

    241108-ghp42axalc

  • MD5

    8c589b51e4bdf2b074335e3ce966b204

  • SHA1

    c622ac190128802b199dfa9a26c8fda3f4eb635f

  • SHA256

    6ffb73495d5f0c6f895c4426ac7213abc94e5fae8e25ecd70fa4c832248fd57e

  • SHA512

    b19e8a6e423167d43fee78439a00b23db4f739eea9bc39371c0e7801593377b8ba786ad105300263ebe3ce1b3c8b926f61f108e36a8b228da5fc24daf7457360

  • SSDEEP

    12288:0MrIy90j/RuZBnwKwk5GgPBjHyNbSGWxl+PwTUof0:EyukTnw3HgHGa+PcUos

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      6ffb73495d5f0c6f895c4426ac7213abc94e5fae8e25ecd70fa4c832248fd57e

    • Size

      470KB

    • MD5

      8c589b51e4bdf2b074335e3ce966b204

    • SHA1

      c622ac190128802b199dfa9a26c8fda3f4eb635f

    • SHA256

      6ffb73495d5f0c6f895c4426ac7213abc94e5fae8e25ecd70fa4c832248fd57e

    • SHA512

      b19e8a6e423167d43fee78439a00b23db4f739eea9bc39371c0e7801593377b8ba786ad105300263ebe3ce1b3c8b926f61f108e36a8b228da5fc24daf7457360

    • SSDEEP

      12288:0MrIy90j/RuZBnwKwk5GgPBjHyNbSGWxl+PwTUof0:EyukTnw3HgHGa+PcUos

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks