General

  • Target

    308d48fd1c88366284ec603441415c106fb7dd235ff019fee08971199e0aa7fe

  • Size

    726KB

  • Sample

    241109-hsgfbazepn

  • MD5

    b9fe6147dc7a518d052a474097ceadbd

  • SHA1

    824d031ffa99a4b2eb15b6a5f665e92e43af3ec2

  • SHA256

    308d48fd1c88366284ec603441415c106fb7dd235ff019fee08971199e0aa7fe

  • SHA512

    dd644217400eb34076f3244959248733dacf8e30370cb59b3688b0c2588000865205de6b91e86171b687ea18775ec98d8eaf7aba4ad567ae1ee8dd37f682b150

  • SSDEEP

    12288:KMr0y90OVtd0BcHwYYx1vNNdNZRAa3DyZ/snuBB7rzyQblB5ArRXBrNgkRJ:iyd70Bc6x1lZZa/5BBry8XulBrNrb

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      308d48fd1c88366284ec603441415c106fb7dd235ff019fee08971199e0aa7fe

    • Size

      726KB

    • MD5

      b9fe6147dc7a518d052a474097ceadbd

    • SHA1

      824d031ffa99a4b2eb15b6a5f665e92e43af3ec2

    • SHA256

      308d48fd1c88366284ec603441415c106fb7dd235ff019fee08971199e0aa7fe

    • SHA512

      dd644217400eb34076f3244959248733dacf8e30370cb59b3688b0c2588000865205de6b91e86171b687ea18775ec98d8eaf7aba4ad567ae1ee8dd37f682b150

    • SSDEEP

      12288:KMr0y90OVtd0BcHwYYx1vNNdNZRAa3DyZ/snuBB7rzyQblB5ArRXBrNgkRJ:iyd70Bc6x1lZZa/5BBry8XulBrNrb

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks