General

  • Target

    a3b8e619bf51c3a1d63ef03a447dc2b5e0c8a7c5a994e515cf3bf40fc086f471

  • Size

    500KB

  • Sample

    241111-cw6lqazlgz

  • MD5

    c0ce96402e4a30fa59c875ca28d188b7

  • SHA1

    0d3dceca4f323f2b8dc6193b8da24ac36846f2f0

  • SHA256

    a3b8e619bf51c3a1d63ef03a447dc2b5e0c8a7c5a994e515cf3bf40fc086f471

  • SHA512

    4b175b35d4f416247f396e891f6d6b8de337563e499e708345d5538310b236a8d1425f6c67c0cfe17f28821296b342f2b53124933481ab0688f2634c4932b697

  • SSDEEP

    6144:Kay+bnr+Op0yN90QEm1fNQfRIYRlc6a2BV71IwCXJpZv36VnmbWYGimHycllTV5Z:CMray90EHQGfMI1BbWZlTG0

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      a3b8e619bf51c3a1d63ef03a447dc2b5e0c8a7c5a994e515cf3bf40fc086f471

    • Size

      500KB

    • MD5

      c0ce96402e4a30fa59c875ca28d188b7

    • SHA1

      0d3dceca4f323f2b8dc6193b8da24ac36846f2f0

    • SHA256

      a3b8e619bf51c3a1d63ef03a447dc2b5e0c8a7c5a994e515cf3bf40fc086f471

    • SHA512

      4b175b35d4f416247f396e891f6d6b8de337563e499e708345d5538310b236a8d1425f6c67c0cfe17f28821296b342f2b53124933481ab0688f2634c4932b697

    • SSDEEP

      6144:Kay+bnr+Op0yN90QEm1fNQfRIYRlc6a2BV71IwCXJpZv36VnmbWYGimHycllTV5Z:CMray90EHQGfMI1BbWZlTG0

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks