General

  • Target

    a0b461c00fcc81acf0eefac92446b3e0e2bb7758b1ae5f2fd56842935d36220f

  • Size

    723KB

  • Sample

    241109-fyhjfsxpbx

  • MD5

    c6cb4a7b160762231e61848ddccafc1d

  • SHA1

    1961116c001fd6736664d5bca39023c2e56449b9

  • SHA256

    a0b461c00fcc81acf0eefac92446b3e0e2bb7758b1ae5f2fd56842935d36220f

  • SHA512

    079c784a134a2f1fbe3db09ecd8778d6726d2a3e1899caa8e464226228fb1fd8044b907295685f2207d5c4d14663d0eb737a2af733bbad4f17a09be6c5cfa0fa

  • SSDEEP

    12288:FMrvy90Rb+J5oAJgXk5UTgNWHYCZl3KXV7njTEYA5UY0UWkBFx56Rzg/J2MB2i:WyObm5Nb5ULqXVzjTEYAYRtc/sMBx

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      a0b461c00fcc81acf0eefac92446b3e0e2bb7758b1ae5f2fd56842935d36220f

    • Size

      723KB

    • MD5

      c6cb4a7b160762231e61848ddccafc1d

    • SHA1

      1961116c001fd6736664d5bca39023c2e56449b9

    • SHA256

      a0b461c00fcc81acf0eefac92446b3e0e2bb7758b1ae5f2fd56842935d36220f

    • SHA512

      079c784a134a2f1fbe3db09ecd8778d6726d2a3e1899caa8e464226228fb1fd8044b907295685f2207d5c4d14663d0eb737a2af733bbad4f17a09be6c5cfa0fa

    • SSDEEP

      12288:FMrvy90Rb+J5oAJgXk5UTgNWHYCZl3KXV7njTEYA5UY0UWkBFx56Rzg/J2MB2i:WyObm5Nb5ULqXVzjTEYAYRtc/sMBx

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks