General

  • Target

    b80e6c783dda5433aeb494c94966f86dd4360c5c1f73648fa8a3d060e89d1a0aN.exe

  • Size

    202KB

  • Sample

    241112-t46p5azmck

  • MD5

    a7972f4c09af7356641faa69f97c85b0

  • SHA1

    876aab27555c4ad64a81be490f7e96bcb95842d1

  • SHA256

    b80e6c783dda5433aeb494c94966f86dd4360c5c1f73648fa8a3d060e89d1a0a

  • SHA512

    b4b59bb10a65a31f4f1b3ecc644d565def83ba7bcd95131427875be1b3f8d2b7b48142ea2ba18b38a45ca10d42493780d1ab190dbf3d9c5ba639cd4532d078de

  • SSDEEP

    3072:KFy+bnr+O1s5GWp1icKAArDZz4N9GhbkrNEk66fA7jkFF9j5dBKOqlY1:KFy+bnr+Hp0yN90QEgfAHsF3x

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      b80e6c783dda5433aeb494c94966f86dd4360c5c1f73648fa8a3d060e89d1a0aN.exe

    • Size

      202KB

    • MD5

      a7972f4c09af7356641faa69f97c85b0

    • SHA1

      876aab27555c4ad64a81be490f7e96bcb95842d1

    • SHA256

      b80e6c783dda5433aeb494c94966f86dd4360c5c1f73648fa8a3d060e89d1a0a

    • SHA512

      b4b59bb10a65a31f4f1b3ecc644d565def83ba7bcd95131427875be1b3f8d2b7b48142ea2ba18b38a45ca10d42493780d1ab190dbf3d9c5ba639cd4532d078de

    • SSDEEP

      3072:KFy+bnr+O1s5GWp1icKAArDZz4N9GhbkrNEk66fA7jkFF9j5dBKOqlY1:KFy+bnr+Hp0yN90QEgfAHsF3x

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks