General

  • Target

    21e643051a02ecfb1d0ece8856f159cb1a9b009acbdee3d391cc7e3f94b69a45N

  • Size

    202KB

  • Sample

    241109-2j96tawqbl

  • MD5

    3fcd2897bc3a11573f686381062e35f0

  • SHA1

    18f6bc6fba81de189071a7203aa8b1e9334f9c36

  • SHA256

    21e643051a02ecfb1d0ece8856f159cb1a9b009acbdee3d391cc7e3f94b69a45

  • SHA512

    4cbdd538694df859020c2596473da9b6bc0ffe76d7840aecbe3a46aa85f9cf9bc35fea866387d2347877615db0b070d468a204eb88ffc37bf7d366c1461de179

  • SSDEEP

    3072:Kgy+bnr+O1s5GWp1icKAArDZz4N9GhbkrNEk6KfA7jkFF9j5dBKODlY1:Kgy+bnr+Hp0yN90QEwfAHsF3o

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      21e643051a02ecfb1d0ece8856f159cb1a9b009acbdee3d391cc7e3f94b69a45N

    • Size

      202KB

    • MD5

      3fcd2897bc3a11573f686381062e35f0

    • SHA1

      18f6bc6fba81de189071a7203aa8b1e9334f9c36

    • SHA256

      21e643051a02ecfb1d0ece8856f159cb1a9b009acbdee3d391cc7e3f94b69a45

    • SHA512

      4cbdd538694df859020c2596473da9b6bc0ffe76d7840aecbe3a46aa85f9cf9bc35fea866387d2347877615db0b070d468a204eb88ffc37bf7d366c1461de179

    • SSDEEP

      3072:Kgy+bnr+O1s5GWp1icKAArDZz4N9GhbkrNEk6KfA7jkFF9j5dBKODlY1:Kgy+bnr+Hp0yN90QEwfAHsF3o

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks