General

  • Target

    a7b83eb396a76d4abfdd618fc37d0d71d4909c045678abe11dcc5f71625105fa

  • Size

    720KB

  • Sample

    241109-wrvs7szbkl

  • MD5

    c0a1bf8516da68434795e2318577a860

  • SHA1

    f0b3284806f991e0d58b7da548ebaa357241bfcb

  • SHA256

    a7b83eb396a76d4abfdd618fc37d0d71d4909c045678abe11dcc5f71625105fa

  • SHA512

    a06b7d8c842f3fdaad856d27eb5fd5b5a365798fdba689cb4e60269469feffaadbacf3195f93588514b1f6961eb5d4337f26224a622e1e04b4afaaa31b411d7a

  • SSDEEP

    12288:MMrwy90WLl8VGQUFXjLRw2DtzgZrNsd6m1JFSQFicTv4jsAamxWcaKIWp0pThr+E:UyPLmVGdRvDtcrGbjF35p/LKIWpmAenj

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      a7b83eb396a76d4abfdd618fc37d0d71d4909c045678abe11dcc5f71625105fa

    • Size

      720KB

    • MD5

      c0a1bf8516da68434795e2318577a860

    • SHA1

      f0b3284806f991e0d58b7da548ebaa357241bfcb

    • SHA256

      a7b83eb396a76d4abfdd618fc37d0d71d4909c045678abe11dcc5f71625105fa

    • SHA512

      a06b7d8c842f3fdaad856d27eb5fd5b5a365798fdba689cb4e60269469feffaadbacf3195f93588514b1f6961eb5d4337f26224a622e1e04b4afaaa31b411d7a

    • SSDEEP

      12288:MMrwy90WLl8VGQUFXjLRw2DtzgZrNsd6m1JFSQFicTv4jsAamxWcaKIWp0pThr+E:UyPLmVGdRvDtcrGbjF35p/LKIWpmAenj

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks