General

  • Target

    1b883351a4770aca0b1a7c0f2e16140cbcbe5cc56328ac27618b7da5f8594996

  • Size

    471KB

  • Sample

    241109-v3jdwaxqcy

  • MD5

    979198bef60d4e4ff211eb73f2d4d23b

  • SHA1

    2336b6337d8a7205983af37fbfea0264935910cc

  • SHA256

    1b883351a4770aca0b1a7c0f2e16140cbcbe5cc56328ac27618b7da5f8594996

  • SHA512

    3d2a4ced5f3c5f02a8b25a1681467a2f9706dd2819b5d4d5828bf7e6c7b8268b184212c49310b5ea1f8cf68a845fc2f2299bbcbf5ed67d625eb1734b9814c451

  • SSDEEP

    12288:2Mrty90eLCjGSkvP+UDhtweSI8XHE3t+dUjcpSw:byWkvmShtweSIyfCcf

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      1b883351a4770aca0b1a7c0f2e16140cbcbe5cc56328ac27618b7da5f8594996

    • Size

      471KB

    • MD5

      979198bef60d4e4ff211eb73f2d4d23b

    • SHA1

      2336b6337d8a7205983af37fbfea0264935910cc

    • SHA256

      1b883351a4770aca0b1a7c0f2e16140cbcbe5cc56328ac27618b7da5f8594996

    • SHA512

      3d2a4ced5f3c5f02a8b25a1681467a2f9706dd2819b5d4d5828bf7e6c7b8268b184212c49310b5ea1f8cf68a845fc2f2299bbcbf5ed67d625eb1734b9814c451

    • SSDEEP

      12288:2Mrty90eLCjGSkvP+UDhtweSI8XHE3t+dUjcpSw:byWkvmShtweSIyfCcf

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks