General

  • Target

    bb39e6d09eeb8024865f6bb40ab71b93948d1439b406dccf698d1cf9a0f71ac7

  • Size

    470KB

  • Sample

    241110-cqdnraxemf

  • MD5

    c010667e140c2ea4746e0e7d1d9cb052

  • SHA1

    c177132cc7aeff9d4cd895174a1a98c9febbad36

  • SHA256

    bb39e6d09eeb8024865f6bb40ab71b93948d1439b406dccf698d1cf9a0f71ac7

  • SHA512

    081f375dd3c773fe4f76f1bf4db17755b2ebbd9e85ff36bd4d28491bd8f48f52ba24ec1a1f55663488d8c2f4345679c20a32d006ec6a68ab1e4c5c43d7b94228

  • SSDEEP

    12288:jMr1y906s0jPgzDFerOGZ+TwsiCvt+9xVVhgued:ay+08XFlRss9t+bVV+ued

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      bb39e6d09eeb8024865f6bb40ab71b93948d1439b406dccf698d1cf9a0f71ac7

    • Size

      470KB

    • MD5

      c010667e140c2ea4746e0e7d1d9cb052

    • SHA1

      c177132cc7aeff9d4cd895174a1a98c9febbad36

    • SHA256

      bb39e6d09eeb8024865f6bb40ab71b93948d1439b406dccf698d1cf9a0f71ac7

    • SHA512

      081f375dd3c773fe4f76f1bf4db17755b2ebbd9e85ff36bd4d28491bd8f48f52ba24ec1a1f55663488d8c2f4345679c20a32d006ec6a68ab1e4c5c43d7b94228

    • SSDEEP

      12288:jMr1y906s0jPgzDFerOGZ+TwsiCvt+9xVVhgued:ay+08XFlRss9t+bVV+ued

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks