General

  • Target

    0eedbce07dd4a842383dfa5ecea7f34d873fd8d7fcf189f092ef3c92d555301c

  • Size

    723KB

  • Sample

    241110-d1j4ys1qhl

  • MD5

    9d3d9f7711c1017ab691ed1fb8339139

  • SHA1

    d6ae949781a5e32eeacf53320ed082b6d4ecd6d0

  • SHA256

    0eedbce07dd4a842383dfa5ecea7f34d873fd8d7fcf189f092ef3c92d555301c

  • SHA512

    d19afd152536b2fb988689c4d0a90d53fa1a0c796284b0f4f83b1a89c93b64fcfd4f555f63efcc4251c31dfc054b675c033703962d9863496a497ad876463218

  • SSDEEP

    12288:zMrmy90mZIDS7H6RS5snVDkoBb3PQgEcuKaHtKCEYA6zqstQojIozhdCF3j7:xy1wS7HBGWA8zZNECEYARstvjIcKF3v

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      0eedbce07dd4a842383dfa5ecea7f34d873fd8d7fcf189f092ef3c92d555301c

    • Size

      723KB

    • MD5

      9d3d9f7711c1017ab691ed1fb8339139

    • SHA1

      d6ae949781a5e32eeacf53320ed082b6d4ecd6d0

    • SHA256

      0eedbce07dd4a842383dfa5ecea7f34d873fd8d7fcf189f092ef3c92d555301c

    • SHA512

      d19afd152536b2fb988689c4d0a90d53fa1a0c796284b0f4f83b1a89c93b64fcfd4f555f63efcc4251c31dfc054b675c033703962d9863496a497ad876463218

    • SSDEEP

      12288:zMrmy90mZIDS7H6RS5snVDkoBb3PQgEcuKaHtKCEYA6zqstQojIozhdCF3j7:xy1wS7HBGWA8zZNECEYARstvjIcKF3v

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks