General

  • Target

    4ca7601cd9fbdc6a5ceaeb4f0d8de9d250c812bbdecae8b901f29be7367d6f1e

  • Size

    484KB

  • Sample

    241110-nvqpnawcqq

  • MD5

    1c7a52bffc65a15910b535af18c7d6cc

  • SHA1

    b11ec81a37da568a7370afee88a6bc54efc38b79

  • SHA256

    4ca7601cd9fbdc6a5ceaeb4f0d8de9d250c812bbdecae8b901f29be7367d6f1e

  • SHA512

    38ad8bcc64039712502de71a73628b85cf5cf6e4d9683fc60274cdd692bfed4dc9b630ccf452a8dc441f38da03bf957a3f4e47517854aa57997ee04f246156df

  • SSDEEP

    12288:3MrVy9096VgZe/Zg6EyAWtcC6Z5unypICkVk9z8N:uy27+PELWtR6LVpIMz8N

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      4ca7601cd9fbdc6a5ceaeb4f0d8de9d250c812bbdecae8b901f29be7367d6f1e

    • Size

      484KB

    • MD5

      1c7a52bffc65a15910b535af18c7d6cc

    • SHA1

      b11ec81a37da568a7370afee88a6bc54efc38b79

    • SHA256

      4ca7601cd9fbdc6a5ceaeb4f0d8de9d250c812bbdecae8b901f29be7367d6f1e

    • SHA512

      38ad8bcc64039712502de71a73628b85cf5cf6e4d9683fc60274cdd692bfed4dc9b630ccf452a8dc441f38da03bf957a3f4e47517854aa57997ee04f246156df

    • SSDEEP

      12288:3MrVy9096VgZe/Zg6EyAWtcC6Z5unypICkVk9z8N:uy27+PELWtR6LVpIMz8N

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks