General

  • Target

    9540ea68e3024d3690b5ead93a685e7e8dff3f4f3ef8735df860e730f6f09d9a

  • Size

    477KB

  • Sample

    241109-kw7g1s1jfv

  • MD5

    883f07cb97113f543b5e53c1dee225ce

  • SHA1

    cee3511c24bb881d8ab11a05325f1e2ecc235b75

  • SHA256

    9540ea68e3024d3690b5ead93a685e7e8dff3f4f3ef8735df860e730f6f09d9a

  • SHA512

    09b80ce68743bc1b0155993c7111e6dedab6e6c33db1ad3cfe4747e5a90378041841c3bf2e71d6412792970884d7a2fd34f9cb3dd0787b001159b7ad5fe3b613

  • SSDEEP

    6144:Kuy+bnr+Ep0yN90QExocVjZ3UfgLS5WfOrYghM0Lx8hatAbybg7bi53xtfImvSF:GMrIy90z3hLS5IGhjF+fmgPipxJZy

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      9540ea68e3024d3690b5ead93a685e7e8dff3f4f3ef8735df860e730f6f09d9a

    • Size

      477KB

    • MD5

      883f07cb97113f543b5e53c1dee225ce

    • SHA1

      cee3511c24bb881d8ab11a05325f1e2ecc235b75

    • SHA256

      9540ea68e3024d3690b5ead93a685e7e8dff3f4f3ef8735df860e730f6f09d9a

    • SHA512

      09b80ce68743bc1b0155993c7111e6dedab6e6c33db1ad3cfe4747e5a90378041841c3bf2e71d6412792970884d7a2fd34f9cb3dd0787b001159b7ad5fe3b613

    • SSDEEP

      6144:Kuy+bnr+Ep0yN90QExocVjZ3UfgLS5WfOrYghM0Lx8hatAbybg7bi53xtfImvSF:GMrIy90z3hLS5IGhjF+fmgPipxJZy

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks