General

  • Target

    9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0

  • Size

    499KB

  • Sample

    241110-f53g7sznbx

  • MD5

    474bb59c2e0fd4304a48dbaf46fbccc6

  • SHA1

    31760d6126e93995c513281f6a4c9e6fcebda08b

  • SHA256

    9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0

  • SHA512

    1bd1b45b3371e399ad214ea233b16a5a939f402a91906db08070d8e8aa60470332e97b99d6c3ee8729b71a84f0065c278416b03c0a33f4103f0bd6acc0f58d16

  • SSDEEP

    6144:KPy+bnr+3p0yN90QEO20+ZGcGtuZnSSoTkeuYFBITaHOXHH6zhv2VSvYxvgrIJxh:tMr3y906+ZecSXwaUahrvS3JxjgoEu/

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0

    • Size

      499KB

    • MD5

      474bb59c2e0fd4304a48dbaf46fbccc6

    • SHA1

      31760d6126e93995c513281f6a4c9e6fcebda08b

    • SHA256

      9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0

    • SHA512

      1bd1b45b3371e399ad214ea233b16a5a939f402a91906db08070d8e8aa60470332e97b99d6c3ee8729b71a84f0065c278416b03c0a33f4103f0bd6acc0f58d16

    • SSDEEP

      6144:KPy+bnr+3p0yN90QEO20+ZGcGtuZnSSoTkeuYFBITaHOXHH6zhv2VSvYxvgrIJxh:tMr3y906+ZecSXwaUahrvS3JxjgoEu/

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks