General

  • Target

    6540a1b5d0aa0f4f74a15b71ecc923382a5f51ba91886f05445def098e9588b0

  • Size

    484KB

  • Sample

    241111-fbpn9aslht

  • MD5

    22a381b1fb43a4e1bfa28cdb967bb857

  • SHA1

    044eea4f5ecd40e450ea141df9e199ec619074f0

  • SHA256

    6540a1b5d0aa0f4f74a15b71ecc923382a5f51ba91886f05445def098e9588b0

  • SHA512

    f4cdad954dc345cb1ee908031df048cdb3ff345ad2bdf9cbf65cb7daa9b306ae63e70be181d06fa825cfdce623db820ea5d11c664893b5608446814e5754b66a

  • SSDEEP

    12288:eMryy90nrByVpzfiGIMeG3Y7JUC6j5u/ypICkEpHwHT:gyZzfiG3YN56VLpImHiT

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      6540a1b5d0aa0f4f74a15b71ecc923382a5f51ba91886f05445def098e9588b0

    • Size

      484KB

    • MD5

      22a381b1fb43a4e1bfa28cdb967bb857

    • SHA1

      044eea4f5ecd40e450ea141df9e199ec619074f0

    • SHA256

      6540a1b5d0aa0f4f74a15b71ecc923382a5f51ba91886f05445def098e9588b0

    • SHA512

      f4cdad954dc345cb1ee908031df048cdb3ff345ad2bdf9cbf65cb7daa9b306ae63e70be181d06fa825cfdce623db820ea5d11c664893b5608446814e5754b66a

    • SSDEEP

      12288:eMryy90nrByVpzfiGIMeG3Y7JUC6j5u/ypICkEpHwHT:gyZzfiG3YN56VLpImHiT

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks