General

  • Target

    76aa814e285c8557de9ad823b94f2eb9c87e98151f1ad4136553a22e7cdcf841

  • Size

    500KB

  • Sample

    241109-gvffcszaja

  • MD5

    f772c1f6f744198cd1b8777e41d7fa7d

  • SHA1

    f9b22c9ced7153f2136c7a2ca4e5fd83e79671b3

  • SHA256

    76aa814e285c8557de9ad823b94f2eb9c87e98151f1ad4136553a22e7cdcf841

  • SHA512

    b1fa8e9bf7663b19d2017513fa6910a4b7713797e42270747f4984f13a5e95baf2e0cf86abcad75b070f465fbc84a881d801cd6411cea1ab90ee5f5a381afee5

  • SSDEEP

    12288:0Mr6y90nA0TaoYtomMdWhvKsNs9YEXHEA:+ylYAoDgCOEXHp

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      76aa814e285c8557de9ad823b94f2eb9c87e98151f1ad4136553a22e7cdcf841

    • Size

      500KB

    • MD5

      f772c1f6f744198cd1b8777e41d7fa7d

    • SHA1

      f9b22c9ced7153f2136c7a2ca4e5fd83e79671b3

    • SHA256

      76aa814e285c8557de9ad823b94f2eb9c87e98151f1ad4136553a22e7cdcf841

    • SHA512

      b1fa8e9bf7663b19d2017513fa6910a4b7713797e42270747f4984f13a5e95baf2e0cf86abcad75b070f465fbc84a881d801cd6411cea1ab90ee5f5a381afee5

    • SSDEEP

      12288:0Mr6y90nA0TaoYtomMdWhvKsNs9YEXHEA:+ylYAoDgCOEXHp

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks