General

  • Target

    ce09c339c1de70c8b8d6040de19b8cf946b071d9e4dce6a23b488ceab76963f7

  • Size

    470KB

  • Sample

    241109-fd541sxhpj

  • MD5

    94ef81b890c1c4297489ad91f131ba00

  • SHA1

    e2a937925ca60c8ca254db780d41bfd1b5428d9a

  • SHA256

    ce09c339c1de70c8b8d6040de19b8cf946b071d9e4dce6a23b488ceab76963f7

  • SHA512

    97d87e4c0e5040d207240e4611b81d8dcd07c081065c0c4586799df4f2e55ad170c37bd0a3d4a060ed460faba27d5279e0415251bc375a56e25b46c8da019e7e

  • SSDEEP

    12288:hMrNy90xiLt3JWm0/Qsf7qFVW/D3x0WPZeb:0ybUm04oCWTpZk

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      ce09c339c1de70c8b8d6040de19b8cf946b071d9e4dce6a23b488ceab76963f7

    • Size

      470KB

    • MD5

      94ef81b890c1c4297489ad91f131ba00

    • SHA1

      e2a937925ca60c8ca254db780d41bfd1b5428d9a

    • SHA256

      ce09c339c1de70c8b8d6040de19b8cf946b071d9e4dce6a23b488ceab76963f7

    • SHA512

      97d87e4c0e5040d207240e4611b81d8dcd07c081065c0c4586799df4f2e55ad170c37bd0a3d4a060ed460faba27d5279e0415251bc375a56e25b46c8da019e7e

    • SSDEEP

      12288:hMrNy90xiLt3JWm0/Qsf7qFVW/D3x0WPZeb:0ybUm04oCWTpZk

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks