General

  • Target

    74f12bd2ea05775e111f8eed69e81d3e3e9e90bb1ea65985703aa34f3aa6c535

  • Size

    484KB

  • Sample

    241110-hqg9ts1ncz

  • MD5

    2564ed7ef018c9c17fa172c999369257

  • SHA1

    60930bbe78517f166fc6a54205456b55107904b3

  • SHA256

    74f12bd2ea05775e111f8eed69e81d3e3e9e90bb1ea65985703aa34f3aa6c535

  • SHA512

    7f0d7c0576ee20c00417e2d1d909416ebdcc74e786db6ff95ac531837a5bfe3c12f7a1e7a139972b243bfb538c19a6c82d8586da73825d70c1792b1dfd8c3179

  • SSDEEP

    12288:AMrIy90dw8qjwZxPewC635udypICki6AfYP:YyMKjwZxPW6JDpIGfQ

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      74f12bd2ea05775e111f8eed69e81d3e3e9e90bb1ea65985703aa34f3aa6c535

    • Size

      484KB

    • MD5

      2564ed7ef018c9c17fa172c999369257

    • SHA1

      60930bbe78517f166fc6a54205456b55107904b3

    • SHA256

      74f12bd2ea05775e111f8eed69e81d3e3e9e90bb1ea65985703aa34f3aa6c535

    • SHA512

      7f0d7c0576ee20c00417e2d1d909416ebdcc74e786db6ff95ac531837a5bfe3c12f7a1e7a139972b243bfb538c19a6c82d8586da73825d70c1792b1dfd8c3179

    • SSDEEP

      12288:AMrIy90dw8qjwZxPewC635udypICki6AfYP:YyMKjwZxPW6JDpIGfQ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks