General

  • Target

    0b3e93a7923de9cbcdb90876445e54fa6929281e31fc63e4aff362d024cd6254

  • Size

    482KB

  • Sample

    241108-r4z68sthmr

  • MD5

    45494d55e9369121b009242e253cc999

  • SHA1

    0606eb5b68a02df4e5345fa1a7aeaaaf06978b60

  • SHA256

    0b3e93a7923de9cbcdb90876445e54fa6929281e31fc63e4aff362d024cd6254

  • SHA512

    14f3e3ae8a07986e551021c8dd95a29119dc790625f459d2ee9750d78ee7b7944a7c87d757270ca1960990b3013f06d7b747d8083de3c1fe493ec2764d9589b2

  • SSDEEP

    12288:KMr/y90hyEb99VNnYCZWFkwC3KyEIRUwTruK7Tium5V9:xyinbbVVYkwCj5UmuK7ub5H

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      0b3e93a7923de9cbcdb90876445e54fa6929281e31fc63e4aff362d024cd6254

    • Size

      482KB

    • MD5

      45494d55e9369121b009242e253cc999

    • SHA1

      0606eb5b68a02df4e5345fa1a7aeaaaf06978b60

    • SHA256

      0b3e93a7923de9cbcdb90876445e54fa6929281e31fc63e4aff362d024cd6254

    • SHA512

      14f3e3ae8a07986e551021c8dd95a29119dc790625f459d2ee9750d78ee7b7944a7c87d757270ca1960990b3013f06d7b747d8083de3c1fe493ec2764d9589b2

    • SSDEEP

      12288:KMr/y90hyEb99VNnYCZWFkwC3KyEIRUwTruK7Tium5V9:xyinbbVVYkwCj5UmuK7ub5H

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks