General

  • Target

    4876dc16347ca4aec3d220826cba56b6e59d873c27c8aa075e9e065734a38f3e

  • Size

    470KB

  • Sample

    241109-sh44qswhna

  • MD5

    e927ac94cb2fdbbc842b4b8cf08d7874

  • SHA1

    c9c0b1a94a5a022bd1e3efbdeaeb67d8a17eedf3

  • SHA256

    4876dc16347ca4aec3d220826cba56b6e59d873c27c8aa075e9e065734a38f3e

  • SHA512

    b7ef713188d97468d67f7a88780b39b58b004c9949a61a1490bb637826354b3a89e289e5a49d7b1fcc76c65d59d3725742e63f548b663b114537674d3eb1d582

  • SSDEEP

    12288:oMrpy90Twb+WPxWJTVuhygqiVPjq1HD5FLkVn:RyFKQWlMhjqiV7qTFwVn

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      4876dc16347ca4aec3d220826cba56b6e59d873c27c8aa075e9e065734a38f3e

    • Size

      470KB

    • MD5

      e927ac94cb2fdbbc842b4b8cf08d7874

    • SHA1

      c9c0b1a94a5a022bd1e3efbdeaeb67d8a17eedf3

    • SHA256

      4876dc16347ca4aec3d220826cba56b6e59d873c27c8aa075e9e065734a38f3e

    • SHA512

      b7ef713188d97468d67f7a88780b39b58b004c9949a61a1490bb637826354b3a89e289e5a49d7b1fcc76c65d59d3725742e63f548b663b114537674d3eb1d582

    • SSDEEP

      12288:oMrpy90Twb+WPxWJTVuhygqiVPjq1HD5FLkVn:RyFKQWlMhjqiV7qTFwVn

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks