General

  • Target

    c5707d371960456c43bb8d04b97a5b459134cd75b9025a557297039c835a76dd

  • Size

    500KB

  • Sample

    241109-q6q6nswalg

  • MD5

    0489cfcb3da1d28b0b664d1e258fe859

  • SHA1

    e21fbb31da1563c18ca1586f4a209daf8ea8f00f

  • SHA256

    c5707d371960456c43bb8d04b97a5b459134cd75b9025a557297039c835a76dd

  • SHA512

    a8eb785cd0e390e6c09ff2340533a79a5a8946625e5ded215f4f35d5de8b3b418133d646766e3f569837a214018c02934381873edcb921d0e55fb348aea8d349

  • SSDEEP

    12288:oMrmy90068IOMiuB/yoJfW/niZcgw5nYP6+/:OymyMlTJfW/IPOr+/

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      c5707d371960456c43bb8d04b97a5b459134cd75b9025a557297039c835a76dd

    • Size

      500KB

    • MD5

      0489cfcb3da1d28b0b664d1e258fe859

    • SHA1

      e21fbb31da1563c18ca1586f4a209daf8ea8f00f

    • SHA256

      c5707d371960456c43bb8d04b97a5b459134cd75b9025a557297039c835a76dd

    • SHA512

      a8eb785cd0e390e6c09ff2340533a79a5a8946625e5ded215f4f35d5de8b3b418133d646766e3f569837a214018c02934381873edcb921d0e55fb348aea8d349

    • SSDEEP

      12288:oMrmy90068IOMiuB/yoJfW/niZcgw5nYP6+/:OymyMlTJfW/IPOr+/

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks