General

  • Target

    f42acf07a3107974608042659e959a538addb5662f593fb0c246830f0063c885

  • Size

    202KB

  • Sample

    241112-fffxxavhne

  • MD5

    857e08a32f132e82fe3e0b21cdf50780

  • SHA1

    f3a8b111811aeb6e2d4ec8e5b41094d695c9ca2b

  • SHA256

    f42acf07a3107974608042659e959a538addb5662f593fb0c246830f0063c885

  • SHA512

    f874906e23468ca89dd8b3996d9ad1103459fc23745e698a48c7729498e502b0379d8586505494c37cbabdb6ddc42c9e39d01aaaf79221cab0a56ea8666e74ea

  • SSDEEP

    3072:KNy+bnr+O1d5GWp1icKAArDZz4N9GhbkrNEk6QfA7jkFF9j5dBKOqlY1:KNy+bnr+yp0yN90QEyfAHsF3l

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      f42acf07a3107974608042659e959a538addb5662f593fb0c246830f0063c885

    • Size

      202KB

    • MD5

      857e08a32f132e82fe3e0b21cdf50780

    • SHA1

      f3a8b111811aeb6e2d4ec8e5b41094d695c9ca2b

    • SHA256

      f42acf07a3107974608042659e959a538addb5662f593fb0c246830f0063c885

    • SHA512

      f874906e23468ca89dd8b3996d9ad1103459fc23745e698a48c7729498e502b0379d8586505494c37cbabdb6ddc42c9e39d01aaaf79221cab0a56ea8666e74ea

    • SSDEEP

      3072:KNy+bnr+O1d5GWp1icKAArDZz4N9GhbkrNEk6QfA7jkFF9j5dBKOqlY1:KNy+bnr+yp0yN90QEyfAHsF3l

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks