General

  • Target

    d31b0852ac17bd9458b35c37ab69bfb8bab0f1a4daf7703dc74584db39bb0247

  • Size

    478KB

  • Sample

    241109-b9pdxsvcmb

  • MD5

    a9cdfa61c264ac00abf8399cf2ed11f8

  • SHA1

    6f273060d901fed059f6f102a4ecd5c754e9ba3b

  • SHA256

    d31b0852ac17bd9458b35c37ab69bfb8bab0f1a4daf7703dc74584db39bb0247

  • SHA512

    336eb86d7fb51dda9c45f82c645900941ef01b5584b14658fb2d57606149a143b41a917014e8c9c4bb184416ccf7d99edf4efee313b82a26859bf4b156234a4e

  • SSDEEP

    12288:eMr0y908p6/h2XjCP7PK4cK5RxktOsOr7+:myzM/gTCzPKQRelt

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      d31b0852ac17bd9458b35c37ab69bfb8bab0f1a4daf7703dc74584db39bb0247

    • Size

      478KB

    • MD5

      a9cdfa61c264ac00abf8399cf2ed11f8

    • SHA1

      6f273060d901fed059f6f102a4ecd5c754e9ba3b

    • SHA256

      d31b0852ac17bd9458b35c37ab69bfb8bab0f1a4daf7703dc74584db39bb0247

    • SHA512

      336eb86d7fb51dda9c45f82c645900941ef01b5584b14658fb2d57606149a143b41a917014e8c9c4bb184416ccf7d99edf4efee313b82a26859bf4b156234a4e

    • SSDEEP

      12288:eMr0y908p6/h2XjCP7PK4cK5RxktOsOr7+:myzM/gTCzPKQRelt

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks