General

  • Target

    ce99083ac02ef7c5913a679026478aa607c6fee7364d4f9e11ec6a0a3d2e6be1

  • Size

    483KB

  • Sample

    241110-qd47tsxfnb

  • MD5

    844815150b8ccbd2c9b4c6774b5cb4bd

  • SHA1

    91d105d3419496078e406fc7f4df4d8988d78c75

  • SHA256

    ce99083ac02ef7c5913a679026478aa607c6fee7364d4f9e11ec6a0a3d2e6be1

  • SHA512

    35d473e1848572bfc97b5c7bd58db293a83521faf23ff508220323cb3dc0d4020bc26ea42ecc8f1cb4f9592e67ba47439e8eb5c42774f1bdf1a5673ea0cbad1d

  • SSDEEP

    12288:iMrby90gXUw10Vvv7+aO18kWbUmEsKtdS+B9RSdDPPEuIS:tyFUw+VvBOr0FtKtLgN6S

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      ce99083ac02ef7c5913a679026478aa607c6fee7364d4f9e11ec6a0a3d2e6be1

    • Size

      483KB

    • MD5

      844815150b8ccbd2c9b4c6774b5cb4bd

    • SHA1

      91d105d3419496078e406fc7f4df4d8988d78c75

    • SHA256

      ce99083ac02ef7c5913a679026478aa607c6fee7364d4f9e11ec6a0a3d2e6be1

    • SHA512

      35d473e1848572bfc97b5c7bd58db293a83521faf23ff508220323cb3dc0d4020bc26ea42ecc8f1cb4f9592e67ba47439e8eb5c42774f1bdf1a5673ea0cbad1d

    • SSDEEP

      12288:iMrby90gXUw10Vvv7+aO18kWbUmEsKtdS+B9RSdDPPEuIS:tyFUw+VvBOr0FtKtLgN6S

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks