General

  • Target

    1ee3cb645942dff54d6390b6d3ef45bf86c0f04b75e85fa9091807b4ccc97f9c

  • Size

    725KB

  • Sample

    241110-zzwx1svlbs

  • MD5

    9f9989a67e981e2fa896b9ed58d8f8e2

  • SHA1

    6a59fb07bbc9a5ae1e28120d0cad920aee82020d

  • SHA256

    1ee3cb645942dff54d6390b6d3ef45bf86c0f04b75e85fa9091807b4ccc97f9c

  • SHA512

    7f45476dc80b64b4a5b8e0ec7995ab5e93cd16f6f03d5285805f21a941ecf7007bec1d2d9d69ffdc6c6e3665564d3739bfdb63e1ddf4fb740762726f626084b8

  • SSDEEP

    12288:AMrqy90h8259g7+RmLa/iwUsSj66DSNdNTtnME74TFCyqMoUV4eLJC5JFiNKW2cd:ayrZ7+RmW/iwLNdNT58TgM7VtLFX2O

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      1ee3cb645942dff54d6390b6d3ef45bf86c0f04b75e85fa9091807b4ccc97f9c

    • Size

      725KB

    • MD5

      9f9989a67e981e2fa896b9ed58d8f8e2

    • SHA1

      6a59fb07bbc9a5ae1e28120d0cad920aee82020d

    • SHA256

      1ee3cb645942dff54d6390b6d3ef45bf86c0f04b75e85fa9091807b4ccc97f9c

    • SHA512

      7f45476dc80b64b4a5b8e0ec7995ab5e93cd16f6f03d5285805f21a941ecf7007bec1d2d9d69ffdc6c6e3665564d3739bfdb63e1ddf4fb740762726f626084b8

    • SSDEEP

      12288:AMrqy90h8259g7+RmLa/iwUsSj66DSNdNTtnME74TFCyqMoUV4eLJC5JFiNKW2cd:ayrZ7+RmW/iwLNdNT58TgM7VtLFX2O

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks