General

  • Target

    e69209ab431e112892a48ca9eaecba7e5d4695dd50658f11f9a2a67f34900db1

  • Size

    500KB

  • Sample

    241109-z6zmgs1qet

  • MD5

    6748116fdfd3b6bdb2638f798aeb683d

  • SHA1

    ff37fe96206bf259ba9af971094432a49d7a2c54

  • SHA256

    e69209ab431e112892a48ca9eaecba7e5d4695dd50658f11f9a2a67f34900db1

  • SHA512

    c5df8573be1f44b506626bc0bee05f564c67875935d511cbd5507802fbe0e9038fce8b052a0e6c0380cd4536f9267a07b92b0c144f1173f65918410dc2193522

  • SSDEEP

    12288:nMrEy90ol0gAdyG5/2RprbW00NpwkPib:LyBuSeORla00zwgw

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      e69209ab431e112892a48ca9eaecba7e5d4695dd50658f11f9a2a67f34900db1

    • Size

      500KB

    • MD5

      6748116fdfd3b6bdb2638f798aeb683d

    • SHA1

      ff37fe96206bf259ba9af971094432a49d7a2c54

    • SHA256

      e69209ab431e112892a48ca9eaecba7e5d4695dd50658f11f9a2a67f34900db1

    • SHA512

      c5df8573be1f44b506626bc0bee05f564c67875935d511cbd5507802fbe0e9038fce8b052a0e6c0380cd4536f9267a07b92b0c144f1173f65918410dc2193522

    • SSDEEP

      12288:nMrEy90ol0gAdyG5/2RprbW00NpwkPib:LyBuSeORla00zwgw

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks