General

  • Target

    690379f1f7e20793d99566befd926166c9bad032b2195c6ca78e779941888f52

  • Size

    501KB

  • Sample

    241109-hex6xaypav

  • MD5

    2341e51020acf52a9e0dca8acfcdf688

  • SHA1

    0a0213cc0c55b9e7c4e497c5fbe01adeb587e9d5

  • SHA256

    690379f1f7e20793d99566befd926166c9bad032b2195c6ca78e779941888f52

  • SHA512

    2e71e9f271da00df49c4913aa4ae378c158bc2b6d3f48c733d60721724a640909b99b9d28d820976ea1b60ad7e55478adec8f9f5ff2e09484a7955c144a9ded4

  • SSDEEP

    12288:7MrUy90LUXUVHJq83eHnoFmIFavYYZ5/yc:/yqnVo8OHoFZ2Z5N

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      690379f1f7e20793d99566befd926166c9bad032b2195c6ca78e779941888f52

    • Size

      501KB

    • MD5

      2341e51020acf52a9e0dca8acfcdf688

    • SHA1

      0a0213cc0c55b9e7c4e497c5fbe01adeb587e9d5

    • SHA256

      690379f1f7e20793d99566befd926166c9bad032b2195c6ca78e779941888f52

    • SHA512

      2e71e9f271da00df49c4913aa4ae378c158bc2b6d3f48c733d60721724a640909b99b9d28d820976ea1b60ad7e55478adec8f9f5ff2e09484a7955c144a9ded4

    • SSDEEP

      12288:7MrUy90LUXUVHJq83eHnoFmIFavYYZ5/yc:/yqnVo8OHoFZ2Z5N

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks