General

  • Target

    75461ffa69c1da2ed70197d88294cb79f9dd1f94c633a67a85afce67198115ba

  • Size

    479KB

  • Sample

    241110-kpgm1ssqav

  • MD5

    2f34cef17c7eda1cd9ab597bc19026df

  • SHA1

    4fb8b0878e322ede7bdee9768800f62cae728f8b

  • SHA256

    75461ffa69c1da2ed70197d88294cb79f9dd1f94c633a67a85afce67198115ba

  • SHA512

    f87727d22b7040da69a6ffe521fdb876b8882cb7539457c111c41b52e74924ad2b6e15fe3cccc6083acb9379e4779887b25d6e96f2b2783b95adae6886704850

  • SSDEEP

    6144:KZy+bnr+mp0yN90QEPPRFkVSoIa8N4IqaNOl+LuBIbIjuV2ARt945vCcggN5:HMrWy90VrkVia8NPbbLwI9cARAL

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      75461ffa69c1da2ed70197d88294cb79f9dd1f94c633a67a85afce67198115ba

    • Size

      479KB

    • MD5

      2f34cef17c7eda1cd9ab597bc19026df

    • SHA1

      4fb8b0878e322ede7bdee9768800f62cae728f8b

    • SHA256

      75461ffa69c1da2ed70197d88294cb79f9dd1f94c633a67a85afce67198115ba

    • SHA512

      f87727d22b7040da69a6ffe521fdb876b8882cb7539457c111c41b52e74924ad2b6e15fe3cccc6083acb9379e4779887b25d6e96f2b2783b95adae6886704850

    • SSDEEP

      6144:KZy+bnr+mp0yN90QEPPRFkVSoIa8N4IqaNOl+LuBIbIjuV2ARt945vCcggN5:HMrWy90VrkVia8NPbbLwI9cARAL

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks