General

  • Target

    1c7d25040f88ae043ace5e05def8d1018d36fba88837f4575ce055ef03833f2c

  • Size

    724KB

  • Sample

    241110-k498watgne

  • MD5

    e09eff4eaaab17b27c14bacbe3e71e4e

  • SHA1

    5c70149743b272fa6ddd65e3385caafbf8ed4d31

  • SHA256

    1c7d25040f88ae043ace5e05def8d1018d36fba88837f4575ce055ef03833f2c

  • SHA512

    e2e2349d930d3fb19ed0ad5d66b679bac54195d93ce7d051f999b5a6b76d67748ce09e1cc0dbf91c580e581b6ffdd53fb3aea45e16924c3229bb0b3250774ca2

  • SSDEEP

    12288:yMrhy90kHnRcDOPGwI+ZEznfxQJ10DFfh+ZpPAT1W+P1iuJELAuIf:PyBHR2hcHJ1CFZMPcFiyIADf

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      1c7d25040f88ae043ace5e05def8d1018d36fba88837f4575ce055ef03833f2c

    • Size

      724KB

    • MD5

      e09eff4eaaab17b27c14bacbe3e71e4e

    • SHA1

      5c70149743b272fa6ddd65e3385caafbf8ed4d31

    • SHA256

      1c7d25040f88ae043ace5e05def8d1018d36fba88837f4575ce055ef03833f2c

    • SHA512

      e2e2349d930d3fb19ed0ad5d66b679bac54195d93ce7d051f999b5a6b76d67748ce09e1cc0dbf91c580e581b6ffdd53fb3aea45e16924c3229bb0b3250774ca2

    • SSDEEP

      12288:yMrhy90kHnRcDOPGwI+ZEznfxQJ10DFfh+ZpPAT1W+P1iuJELAuIf:PyBHR2hcHJ1CFZMPcFiyIADf

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks