General

  • Target

    7624d23f2c4b991ced568222d33d3632476b6ec9c0641f5d3b324124159f9753

  • Size

    478KB

  • Sample

    241109-hqsessyqdy

  • MD5

    40df91ee8d419bf6caf18feabbc89770

  • SHA1

    3a7b9e540d4a77e7fc646ca6fc11a3925c139dad

  • SHA256

    7624d23f2c4b991ced568222d33d3632476b6ec9c0641f5d3b324124159f9753

  • SHA512

    096741e61de255c0a72bd3acbeecd728ee5537112d8fbd2db8666ff4020cc320bb4693b7096a15735b55e926638c16145ce335e540ea3fc58758c7fd1389e61b

  • SSDEEP

    12288:HMrsy9071YmVHLtNSE1zx2At5lxkt0AZ+AASa6:HyA1vVHRAczUClePdY6

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      7624d23f2c4b991ced568222d33d3632476b6ec9c0641f5d3b324124159f9753

    • Size

      478KB

    • MD5

      40df91ee8d419bf6caf18feabbc89770

    • SHA1

      3a7b9e540d4a77e7fc646ca6fc11a3925c139dad

    • SHA256

      7624d23f2c4b991ced568222d33d3632476b6ec9c0641f5d3b324124159f9753

    • SHA512

      096741e61de255c0a72bd3acbeecd728ee5537112d8fbd2db8666ff4020cc320bb4693b7096a15735b55e926638c16145ce335e540ea3fc58758c7fd1389e61b

    • SSDEEP

      12288:HMrsy9071YmVHLtNSE1zx2At5lxkt0AZ+AASa6:HyA1vVHRAczUClePdY6

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks