General

  • Target

    a694f712341018a50ac4fa723af8ed307f4a9deb41b194805f255ae4920a3d31

  • Size

    500KB

  • Sample

    241110-q4h3aaxlgx

  • MD5

    14e47dbdbd24c11579295e74d9213933

  • SHA1

    b0451daf5748f3807a76d8d21e973946e5cd9aeb

  • SHA256

    a694f712341018a50ac4fa723af8ed307f4a9deb41b194805f255ae4920a3d31

  • SHA512

    cbd05e573889fb8ee458c8f0068e330b524618888655571d6c603baf848ef28ede094388daa019dfe23a3f789363e74387fc3a3a06f51c6151343e0eab1670db

  • SSDEEP

    6144:Kiy+bnr+yp0yN90QE0KpWs5NidDmBdVsPKoM0ahJY/d1xRmJqM98QAaIytfYxv+:GMrSy90JsPDGizSW/ni1rgBem8j2

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      a694f712341018a50ac4fa723af8ed307f4a9deb41b194805f255ae4920a3d31

    • Size

      500KB

    • MD5

      14e47dbdbd24c11579295e74d9213933

    • SHA1

      b0451daf5748f3807a76d8d21e973946e5cd9aeb

    • SHA256

      a694f712341018a50ac4fa723af8ed307f4a9deb41b194805f255ae4920a3d31

    • SHA512

      cbd05e573889fb8ee458c8f0068e330b524618888655571d6c603baf848ef28ede094388daa019dfe23a3f789363e74387fc3a3a06f51c6151343e0eab1670db

    • SSDEEP

      6144:Kiy+bnr+yp0yN90QE0KpWs5NidDmBdVsPKoM0ahJY/d1xRmJqM98QAaIytfYxv+:GMrSy90JsPDGizSW/ni1rgBem8j2

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks