General

  • Target

    2197c71bd5bfa809986cfec4a8197a3157c18d1d1fc72007c0db1182785e7d21

  • Size

    478KB

  • Sample

    241108-j93kjs1nhp

  • MD5

    382ff8799e197b241489c9bc35c9d27b

  • SHA1

    f065a210de98d1c10544130cd09175886538998f

  • SHA256

    2197c71bd5bfa809986cfec4a8197a3157c18d1d1fc72007c0db1182785e7d21

  • SHA512

    9427154936162b82cf6c6601cdb3fd043ab7c9686cce678006a6e850313e3cf847a338c793b3356facc38a7179f66485daf2d7f98874ac0e7d62366155dbf8ea

  • SSDEEP

    12288:jMrEy90K4Ikhn41m2+7fXjyGUqVuRIq6ZpPz:rySRem2MGGUqq16Bz

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      2197c71bd5bfa809986cfec4a8197a3157c18d1d1fc72007c0db1182785e7d21

    • Size

      478KB

    • MD5

      382ff8799e197b241489c9bc35c9d27b

    • SHA1

      f065a210de98d1c10544130cd09175886538998f

    • SHA256

      2197c71bd5bfa809986cfec4a8197a3157c18d1d1fc72007c0db1182785e7d21

    • SHA512

      9427154936162b82cf6c6601cdb3fd043ab7c9686cce678006a6e850313e3cf847a338c793b3356facc38a7179f66485daf2d7f98874ac0e7d62366155dbf8ea

    • SSDEEP

      12288:jMrEy90K4Ikhn41m2+7fXjyGUqVuRIq6ZpPz:rySRem2MGGUqq16Bz

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks