General

  • Target

    742d278c7001e33ca7301223f6231e4fedfece2e9beeafa81b487a9d9e61303a

  • Size

    471KB

  • Sample

    241109-zb3qna1kb1

  • MD5

    c95057413810ad173806ad62e6848ca0

  • SHA1

    e7272b1b2957051280699e4c82080220be780262

  • SHA256

    742d278c7001e33ca7301223f6231e4fedfece2e9beeafa81b487a9d9e61303a

  • SHA512

    51e081c17534f0e959cd9dd4a6934701b5e3c91bac61888db3a2864bd2dd40b540f454af0bf0a4ffd2c871e32a0f2adaeb80525c1c3d45808cb6feec802ec2cb

  • SSDEEP

    12288:JMrXy90Peof2BPRA3oZdHlD9AXxITzdDdVWa:myVof2o3ojHlRe6Thh

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      742d278c7001e33ca7301223f6231e4fedfece2e9beeafa81b487a9d9e61303a

    • Size

      471KB

    • MD5

      c95057413810ad173806ad62e6848ca0

    • SHA1

      e7272b1b2957051280699e4c82080220be780262

    • SHA256

      742d278c7001e33ca7301223f6231e4fedfece2e9beeafa81b487a9d9e61303a

    • SHA512

      51e081c17534f0e959cd9dd4a6934701b5e3c91bac61888db3a2864bd2dd40b540f454af0bf0a4ffd2c871e32a0f2adaeb80525c1c3d45808cb6feec802ec2cb

    • SSDEEP

      12288:JMrXy90Peof2BPRA3oZdHlD9AXxITzdDdVWa:myVof2o3ojHlRe6Thh

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks