General

  • Target

    022f941d323dc4ecf458821fddfe0988c8d0f0d0207ba5d36a54e6eaa47c4d02

  • Size

    481KB

  • Sample

    241109-vc2sja1lfr

  • MD5

    9d0cb0fc533d126b70e64244c76a55b3

  • SHA1

    af5c81cf35f24271750ab7e56fdb6f5e4ae39df2

  • SHA256

    022f941d323dc4ecf458821fddfe0988c8d0f0d0207ba5d36a54e6eaa47c4d02

  • SHA512

    d0902be646c57ca5b60a660fc9484e0da9aec5c125ea0b587eab5bd2f37d44d8190a693d58f40b2fdb523a8b446deda4205cdad3789c5bd4cb5aa304ca03a3ab

  • SSDEEP

    12288:NMrRy90gOIYEV1o5M+rPaCSNjSNO4sJBZJA:sykIJVKq+zSNe0JA

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      022f941d323dc4ecf458821fddfe0988c8d0f0d0207ba5d36a54e6eaa47c4d02

    • Size

      481KB

    • MD5

      9d0cb0fc533d126b70e64244c76a55b3

    • SHA1

      af5c81cf35f24271750ab7e56fdb6f5e4ae39df2

    • SHA256

      022f941d323dc4ecf458821fddfe0988c8d0f0d0207ba5d36a54e6eaa47c4d02

    • SHA512

      d0902be646c57ca5b60a660fc9484e0da9aec5c125ea0b587eab5bd2f37d44d8190a693d58f40b2fdb523a8b446deda4205cdad3789c5bd4cb5aa304ca03a3ab

    • SSDEEP

      12288:NMrRy90gOIYEV1o5M+rPaCSNjSNO4sJBZJA:sykIJVKq+zSNe0JA

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks