General

  • Target

    295df8f1fa39cc3b082d61ff0164582bea7b669fa45c54d82ff788a5dfe7f029

  • Size

    470KB

  • Sample

    241110-mc3qtstqhz

  • MD5

    df95c994b48bc8ee6dc85f8d30d16544

  • SHA1

    6175e21812eb40b18092420c727d065876c2d287

  • SHA256

    295df8f1fa39cc3b082d61ff0164582bea7b669fa45c54d82ff788a5dfe7f029

  • SHA512

    429cb1695f337d63a5a72585d199914be581d11b0ff1d0cc548d24a14ad2658ed1ad390b3e5e06cafe1ee9c391b32ee54b658a03016e809d8d2fad7f24f33d5c

  • SSDEEP

    6144:Kny+bnr+hp0yN90QEYEmPHCqKpF3jPKNDj/WC/nHgrEELilBh0EHur9mwafmVV3w:ZMr5y90YHCqKpJ6PDFg91VV3gWc

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      295df8f1fa39cc3b082d61ff0164582bea7b669fa45c54d82ff788a5dfe7f029

    • Size

      470KB

    • MD5

      df95c994b48bc8ee6dc85f8d30d16544

    • SHA1

      6175e21812eb40b18092420c727d065876c2d287

    • SHA256

      295df8f1fa39cc3b082d61ff0164582bea7b669fa45c54d82ff788a5dfe7f029

    • SHA512

      429cb1695f337d63a5a72585d199914be581d11b0ff1d0cc548d24a14ad2658ed1ad390b3e5e06cafe1ee9c391b32ee54b658a03016e809d8d2fad7f24f33d5c

    • SSDEEP

      6144:Kny+bnr+hp0yN90QEYEmPHCqKpF3jPKNDj/WC/nHgrEELilBh0EHur9mwafmVV3w:ZMr5y90YHCqKpJ6PDFg91VV3gWc

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks