General

  • Target

    d2f60aa4e85cb3bd42782eb8fcf5621e2afc2d94fbc25bb7f5325238f1b67528

  • Size

    483KB

  • Sample

    241110-q6q6nsxhlq

  • MD5

    a822868f40829b1c69a4ffad922ee04a

  • SHA1

    780982b4ccad3383d7a359e97054b092ddad5f97

  • SHA256

    d2f60aa4e85cb3bd42782eb8fcf5621e2afc2d94fbc25bb7f5325238f1b67528

  • SHA512

    3f0149c206222efc2391ce41e72151f5bf0c5ae2f94b4408650cb8c8b6599de2711dafe1168cd2d3b68d3fc7ea527ca2a26cd032c7410b8ea972e7beff3b9a34

  • SSDEEP

    12288:NMrEy90JfcUObK2MWLdwsdL02kgN4wsjzfduI0bnh:Rywc3lmsdLEG4lfdybh

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      d2f60aa4e85cb3bd42782eb8fcf5621e2afc2d94fbc25bb7f5325238f1b67528

    • Size

      483KB

    • MD5

      a822868f40829b1c69a4ffad922ee04a

    • SHA1

      780982b4ccad3383d7a359e97054b092ddad5f97

    • SHA256

      d2f60aa4e85cb3bd42782eb8fcf5621e2afc2d94fbc25bb7f5325238f1b67528

    • SHA512

      3f0149c206222efc2391ce41e72151f5bf0c5ae2f94b4408650cb8c8b6599de2711dafe1168cd2d3b68d3fc7ea527ca2a26cd032c7410b8ea972e7beff3b9a34

    • SSDEEP

      12288:NMrEy90JfcUObK2MWLdwsdL02kgN4wsjzfduI0bnh:Rywc3lmsdLEG4lfdybh

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks