General

  • Target

    6ca88822b5ba6b634cfa1edc15a774cd8018bfc10a46b7982fec0f6dae1329eb

  • Size

    426KB

  • Sample

    241109-3qnf3avdlb

  • MD5

    7545fe64d354d414e7e53bc19bbb7aca

  • SHA1

    6b6e8454b6a1997157d4cc9ad892bc0ba9b1c71d

  • SHA256

    6ca88822b5ba6b634cfa1edc15a774cd8018bfc10a46b7982fec0f6dae1329eb

  • SHA512

    bf2d15694dcbe1f346c46c0e4e53a8549b107b9f31b532e2315c8b9e46b64e0c944e0019e79963341862454a9012c2ada81d07a5e6f0fa88649bcd72153e1b5d

  • SSDEEP

    6144:R31JyN90nwWY55KNUm8aYM+ANj2SfEQ/jhcp98vHdztS/mvGbY4xsrcepRQAx:Rjy90FY55dHANCrQrhFJkY4xep6K

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      6098371c5a9482fceb415bbe4b4933a2451a07b26132c8e655fae8a4f7d9062a

    • Size

      477KB

    • MD5

      3dd7ba21f31240754e9d02b96625e5cd

    • SHA1

      bd4a4c84d83bb306527a1781c2e7602b4b9102d3

    • SHA256

      6098371c5a9482fceb415bbe4b4933a2451a07b26132c8e655fae8a4f7d9062a

    • SHA512

      7d7900bdc8cdb202829fe26ae6a9abd9470c4d9cf41198858cb1cd5f114896dde05a42fc47c7987cf2b97efa9419d8a0fc26f08ce21be60b2d3085fb97dfeccd

    • SSDEEP

      6144:KIy+bnr++p0yN90QE6Wm8aYM++Nj2SfEY/j5cp98THdztG/m9GRY4xsZcepRfi+6:EMrOy90JH+NCrYr5hJCY4x6pNs

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks