General

  • Target

    e841688ee16215d4d4887c5a1850d7a8abea5cd1aef244175632bc2d91add78d

  • Size

    483KB

  • Sample

    241108-zr88dazckd

  • MD5

    0e9307eb4a85443b6ab3b3b29e5a9eeb

  • SHA1

    2edf7ba7a38663ba8c1793b1a983584ec05532d1

  • SHA256

    e841688ee16215d4d4887c5a1850d7a8abea5cd1aef244175632bc2d91add78d

  • SHA512

    83a11c8a15d2db715306ab3a112a58b4e4f95f5883160ad77be2144364d22d2f1659f1a3b05c0fc13b4f2b7ca5d9b34ddb2e0e4bac0444518a6d632921eb14ce

  • SSDEEP

    12288:NMrGy90ENDn/RfEL2T7ps7YAw5n1SYwgDeEgmC:jyxjpZT7pfAw5n1n9gmC

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      e841688ee16215d4d4887c5a1850d7a8abea5cd1aef244175632bc2d91add78d

    • Size

      483KB

    • MD5

      0e9307eb4a85443b6ab3b3b29e5a9eeb

    • SHA1

      2edf7ba7a38663ba8c1793b1a983584ec05532d1

    • SHA256

      e841688ee16215d4d4887c5a1850d7a8abea5cd1aef244175632bc2d91add78d

    • SHA512

      83a11c8a15d2db715306ab3a112a58b4e4f95f5883160ad77be2144364d22d2f1659f1a3b05c0fc13b4f2b7ca5d9b34ddb2e0e4bac0444518a6d632921eb14ce

    • SSDEEP

      12288:NMrGy90ENDn/RfEL2T7ps7YAw5n1SYwgDeEgmC:jyxjpZT7pfAw5n1n9gmC

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks