General

  • Target

    3dee4e977e47c4c5fab28e47ba87e8e7be82fd2bf1a909af9de33146d8efa54d

  • Size

    500KB

  • Sample

    241110-f3zcrszhnl

  • MD5

    a9bd7d9d8cc15e38cdec167ae2a1b00e

  • SHA1

    49dc60ca1ffcd5fd92633da922f0176f4c05cb22

  • SHA256

    3dee4e977e47c4c5fab28e47ba87e8e7be82fd2bf1a909af9de33146d8efa54d

  • SHA512

    4b54e6a6f515a40623aed78b3db34de7cb16792b49a6ad73c580632eb50eaddec45a375b0a6745b2810fecfb64770e951856afc89883e0a01048dbf3159ccedc

  • SSDEEP

    12288:YMrDy90RcT0hV9VrvPA9B1mzonS8G/SDC62PAh8:7yH4V9RvP6B1vS562N

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      3dee4e977e47c4c5fab28e47ba87e8e7be82fd2bf1a909af9de33146d8efa54d

    • Size

      500KB

    • MD5

      a9bd7d9d8cc15e38cdec167ae2a1b00e

    • SHA1

      49dc60ca1ffcd5fd92633da922f0176f4c05cb22

    • SHA256

      3dee4e977e47c4c5fab28e47ba87e8e7be82fd2bf1a909af9de33146d8efa54d

    • SHA512

      4b54e6a6f515a40623aed78b3db34de7cb16792b49a6ad73c580632eb50eaddec45a375b0a6745b2810fecfb64770e951856afc89883e0a01048dbf3159ccedc

    • SSDEEP

      12288:YMrDy90RcT0hV9VrvPA9B1mzonS8G/SDC62PAh8:7yH4V9RvP6B1vS562N

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks