General

  • Target

    46892459ba739c80a35de6e22cf3e288e8b80988b8413888cec8d439451c8c4e

  • Size

    478KB

  • Sample

    241109-rdq6mswbqr

  • MD5

    9d2b7de66ce75deae7849c1464d3474a

  • SHA1

    7c59929567d7dcb68132be779f02236f6b950eb4

  • SHA256

    46892459ba739c80a35de6e22cf3e288e8b80988b8413888cec8d439451c8c4e

  • SHA512

    b5c445e742df79a34a1888ba4a88154c0ef83e9d99f11fc070bcadf999d5e6dd6d60ced8777fff81636391b856c313854c432420b0a5e718b65471eee027b7e9

  • SSDEEP

    6144:Kvy+bnr+Np0yN90QET4D4+nZFFyzUsn+vxAvI85tM9BiIaV65Pktu0mHMd4t:ZMr5y906c+ZjsnRQYtM5Fxkt5qMqt

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      46892459ba739c80a35de6e22cf3e288e8b80988b8413888cec8d439451c8c4e

    • Size

      478KB

    • MD5

      9d2b7de66ce75deae7849c1464d3474a

    • SHA1

      7c59929567d7dcb68132be779f02236f6b950eb4

    • SHA256

      46892459ba739c80a35de6e22cf3e288e8b80988b8413888cec8d439451c8c4e

    • SHA512

      b5c445e742df79a34a1888ba4a88154c0ef83e9d99f11fc070bcadf999d5e6dd6d60ced8777fff81636391b856c313854c432420b0a5e718b65471eee027b7e9

    • SSDEEP

      6144:Kvy+bnr+Np0yN90QET4D4+nZFFyzUsn+vxAvI85tM9BiIaV65Pktu0mHMd4t:ZMr5y906c+ZjsnRQYtM5Fxkt5qMqt

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks