General

  • Target

    e895a41a1164858f7e0954ef5b45e228740c0dcfad9b0988be654eee7aa835c2

  • Size

    470KB

  • Sample

    241108-rcnzwsspcy

  • MD5

    13b6483961df265f89e61bc3ac782d68

  • SHA1

    f0f44612d3c8ccb538088ca2312f1d238d19a03c

  • SHA256

    e895a41a1164858f7e0954ef5b45e228740c0dcfad9b0988be654eee7aa835c2

  • SHA512

    2e9bf11b3bcc981c8d9ebeb6caa6b34bc709ce8d289d51921177ecdd71db508bc6a8e2a8245ad679e4193d157327287dbf85002ff2e940d3a6dac8d7c2983bee

  • SSDEEP

    12288:KMrly90hL9kqhrzaMGy+EopQb2vbW/D3xkWP5MgO:/yCyaVheeKbWTZ5M5

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      e895a41a1164858f7e0954ef5b45e228740c0dcfad9b0988be654eee7aa835c2

    • Size

      470KB

    • MD5

      13b6483961df265f89e61bc3ac782d68

    • SHA1

      f0f44612d3c8ccb538088ca2312f1d238d19a03c

    • SHA256

      e895a41a1164858f7e0954ef5b45e228740c0dcfad9b0988be654eee7aa835c2

    • SHA512

      2e9bf11b3bcc981c8d9ebeb6caa6b34bc709ce8d289d51921177ecdd71db508bc6a8e2a8245ad679e4193d157327287dbf85002ff2e940d3a6dac8d7c2983bee

    • SSDEEP

      12288:KMrly90hL9kqhrzaMGy+EopQb2vbW/D3xkWP5MgO:/yCyaVheeKbWTZ5M5

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks