General

  • Target

    f2f16a3d583ec7cf95b8626dcb03b087a96613ce1afb681ee9c93b76bdb36969

  • Size

    483KB

  • Sample

    241109-v1fj7s1qan

  • MD5

    fe5ca883b6c8488cf50688f201bf45a9

  • SHA1

    1a5073cbaaeea39897f3ade47c046beb37b7b50b

  • SHA256

    f2f16a3d583ec7cf95b8626dcb03b087a96613ce1afb681ee9c93b76bdb36969

  • SHA512

    597d2d60f198fd19b65519bbc8db0fd11b41055373e69d712a84e1fb6f52a75d02d3995e420c878b13b24d058569dbe9a602cb7f7ab53fa17b50ba1bbc007295

  • SSDEEP

    6144:Koy+bnr+2p0yN90QEi1bhp3K8k+XE6NhQSPN6c/Xyh/D8SyVFmULy6pjtgL4MJ:gMrGy90a/K83ESlPdiyFmULy69u4MJ

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      f2f16a3d583ec7cf95b8626dcb03b087a96613ce1afb681ee9c93b76bdb36969

    • Size

      483KB

    • MD5

      fe5ca883b6c8488cf50688f201bf45a9

    • SHA1

      1a5073cbaaeea39897f3ade47c046beb37b7b50b

    • SHA256

      f2f16a3d583ec7cf95b8626dcb03b087a96613ce1afb681ee9c93b76bdb36969

    • SHA512

      597d2d60f198fd19b65519bbc8db0fd11b41055373e69d712a84e1fb6f52a75d02d3995e420c878b13b24d058569dbe9a602cb7f7ab53fa17b50ba1bbc007295

    • SSDEEP

      6144:Koy+bnr+2p0yN90QEi1bhp3K8k+XE6NhQSPN6c/Xyh/D8SyVFmULy6pjtgL4MJ:gMrGy90a/K83ESlPdiyFmULy69u4MJ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks