General

  • Target

    8c0c0cb0b6e7418a3e88f2b9f170b3336b088521fabbd86ebd3c26edfac8f98fN

  • Size

    500KB

  • Sample

    241110-ptfzhazmer

  • MD5

    5d9d5531189b29e23a3990479d212890

  • SHA1

    8023e3c546b7620bea6bf369746a9f0267bacea8

  • SHA256

    8c0c0cb0b6e7418a3e88f2b9f170b3336b088521fabbd86ebd3c26edfac8f98f

  • SHA512

    0c20389b2a29647669957e92190b1f9e5d6d7cb606db9d635f8a221fdf2a860b08e023dce7eaf455640b18db475581a3469dabf4ea56af6a8a6cb3f5e61c61ab

  • SSDEEP

    12288:wMrWy90La13xJ6NI67oRcz8OZW/ni1FgBqm8jA:2y8a137h6d8gW/kGkBk

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      8c0c0cb0b6e7418a3e88f2b9f170b3336b088521fabbd86ebd3c26edfac8f98fN

    • Size

      500KB

    • MD5

      5d9d5531189b29e23a3990479d212890

    • SHA1

      8023e3c546b7620bea6bf369746a9f0267bacea8

    • SHA256

      8c0c0cb0b6e7418a3e88f2b9f170b3336b088521fabbd86ebd3c26edfac8f98f

    • SHA512

      0c20389b2a29647669957e92190b1f9e5d6d7cb606db9d635f8a221fdf2a860b08e023dce7eaf455640b18db475581a3469dabf4ea56af6a8a6cb3f5e61c61ab

    • SSDEEP

      12288:wMrWy90La13xJ6NI67oRcz8OZW/ni1FgBqm8jA:2y8a137h6d8gW/kGkBk

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks