General

  • Target

    932215d9e00cf4e809af253763528b054179b55c7884caedddb2f58a3b349604

  • Size

    481KB

  • Sample

    241110-zszekavjf1

  • MD5

    aa907dd9a6fc235107d5ac08e076229e

  • SHA1

    999a325564e70337d810694464b795f46ceed595

  • SHA256

    932215d9e00cf4e809af253763528b054179b55c7884caedddb2f58a3b349604

  • SHA512

    377a5e304b5cecf9cbc33a7103eb01a2e2ccc5b6d35f764792c751a1298a5161006b88b5f790b71a63d69235b2efb7be9af45ad567757e928191824af592e3e6

  • SSDEEP

    6144:K3y+bnr++p0yN90QEJgx/GA9HhjBnQZoiuXxkvS6RbWA7UkVZg1UcCkDM/eEL/Ph:1Mriy90YJtHTiixj6JUKEgEzOfR

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      932215d9e00cf4e809af253763528b054179b55c7884caedddb2f58a3b349604

    • Size

      481KB

    • MD5

      aa907dd9a6fc235107d5ac08e076229e

    • SHA1

      999a325564e70337d810694464b795f46ceed595

    • SHA256

      932215d9e00cf4e809af253763528b054179b55c7884caedddb2f58a3b349604

    • SHA512

      377a5e304b5cecf9cbc33a7103eb01a2e2ccc5b6d35f764792c751a1298a5161006b88b5f790b71a63d69235b2efb7be9af45ad567757e928191824af592e3e6

    • SSDEEP

      6144:K3y+bnr++p0yN90QEJgx/GA9HhjBnQZoiuXxkvS6RbWA7UkVZg1UcCkDM/eEL/Ph:1Mriy90YJtHTiixj6JUKEgEzOfR

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks