General

  • Target

    28e98ab6944468dc5f3491b5b9b6ac0348718487b6cfd8d83d57393a6bd122e9

  • Size

    482KB

  • Sample

    241109-zh9sjsvlaj

  • MD5

    e9822876b0362a7917c208901e3fb809

  • SHA1

    8cdb36a79be4178027257d2abb2b3cd01645221b

  • SHA256

    28e98ab6944468dc5f3491b5b9b6ac0348718487b6cfd8d83d57393a6bd122e9

  • SHA512

    d778c6f0dc76c9de8d79aeef2ae1b2a6e0a8b736f68da28f5c5cbaf9343a058df5a0de4f9f59a61f6c2e275665f6066d1df7a5e7ac6829a48a78aa2a5556a700

  • SSDEEP

    12288:bMrIy90PVxvwBCXySKVb9YWw61eiHDJh5R:XyMxoBCXgbKp61eiJV

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      28e98ab6944468dc5f3491b5b9b6ac0348718487b6cfd8d83d57393a6bd122e9

    • Size

      482KB

    • MD5

      e9822876b0362a7917c208901e3fb809

    • SHA1

      8cdb36a79be4178027257d2abb2b3cd01645221b

    • SHA256

      28e98ab6944468dc5f3491b5b9b6ac0348718487b6cfd8d83d57393a6bd122e9

    • SHA512

      d778c6f0dc76c9de8d79aeef2ae1b2a6e0a8b736f68da28f5c5cbaf9343a058df5a0de4f9f59a61f6c2e275665f6066d1df7a5e7ac6829a48a78aa2a5556a700

    • SSDEEP

      12288:bMrIy90PVxvwBCXySKVb9YWw61eiHDJh5R:XyMxoBCXgbKp61eiJV

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks