General

  • Target

    9fda643f867efb45dae72af1bbc630b8a21c2e67b949817c696b5f514156b29a

  • Size

    470KB

  • Sample

    241108-q2n6hstcpq

  • MD5

    99301c3ff246ad836f31a4ec102ad972

  • SHA1

    20269e57b2105ea4ea3db648897885325fd65bcb

  • SHA256

    9fda643f867efb45dae72af1bbc630b8a21c2e67b949817c696b5f514156b29a

  • SHA512

    007c1e500b26c8d87fcca541ce7cfc3cec89752b7f40d7c92614886d555f6f8006fb30ca8daa9e5305f8fcc65ce29e196a313e86f7fd0c4691efe4178d254749

  • SSDEEP

    12288:jMrly90CvQXDrV1h5kehkbXZgczPJOEZzMV:GyBoXXV1rke+J/hOYu

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      9fda643f867efb45dae72af1bbc630b8a21c2e67b949817c696b5f514156b29a

    • Size

      470KB

    • MD5

      99301c3ff246ad836f31a4ec102ad972

    • SHA1

      20269e57b2105ea4ea3db648897885325fd65bcb

    • SHA256

      9fda643f867efb45dae72af1bbc630b8a21c2e67b949817c696b5f514156b29a

    • SHA512

      007c1e500b26c8d87fcca541ce7cfc3cec89752b7f40d7c92614886d555f6f8006fb30ca8daa9e5305f8fcc65ce29e196a313e86f7fd0c4691efe4178d254749

    • SSDEEP

      12288:jMrly90CvQXDrV1h5kehkbXZgczPJOEZzMV:GyBoXXV1rke+J/hOYu

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks