General

  • Target

    acdc2a081aa3b748f6524e4bbda7dfa8b3016ef9b1aa3e0feb40b948255c9e2b

  • Size

    725KB

  • Sample

    241109-z9e29a1qhx

  • MD5

    8e18b42cb41c060dbe2af686a23f2e85

  • SHA1

    32592753f8a7ab96256bc22994cfc801db5e5183

  • SHA256

    acdc2a081aa3b748f6524e4bbda7dfa8b3016ef9b1aa3e0feb40b948255c9e2b

  • SHA512

    87ac36a1abcfbebc34653590307ab0f979afcd6427b1882a661e1ce5a407617bb8d6e50f3153ffa00d4e7dd9785576a49c5bda2335bc69d96aaf883587f467c0

  • SSDEEP

    12288:bMr8y90DhJ5Ofrxp9AGS1h0du6b2btdC9khPsF74TFByqrU1n1uaB2ToD30pJ:ryyufrVqh0CbDOF8TJrK1u4t3sJ

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      acdc2a081aa3b748f6524e4bbda7dfa8b3016ef9b1aa3e0feb40b948255c9e2b

    • Size

      725KB

    • MD5

      8e18b42cb41c060dbe2af686a23f2e85

    • SHA1

      32592753f8a7ab96256bc22994cfc801db5e5183

    • SHA256

      acdc2a081aa3b748f6524e4bbda7dfa8b3016ef9b1aa3e0feb40b948255c9e2b

    • SHA512

      87ac36a1abcfbebc34653590307ab0f979afcd6427b1882a661e1ce5a407617bb8d6e50f3153ffa00d4e7dd9785576a49c5bda2335bc69d96aaf883587f467c0

    • SSDEEP

      12288:bMr8y90DhJ5Ofrxp9AGS1h0du6b2btdC9khPsF74TFByqrU1n1uaB2ToD30pJ:ryyufrVqh0CbDOF8TJrK1u4t3sJ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks