General

  • Target

    0e6da712b04d13acae654a7ca287c30f50fda3a3ca541b612f50a257edf479ed

  • Size

    539KB

  • Sample

    241117-zhpglsspcq

  • MD5

    208f15658776879ab057845447f79919

  • SHA1

    a12f7dbe1129222b9357560d3c0df9f445bf19ad

  • SHA256

    0e6da712b04d13acae654a7ca287c30f50fda3a3ca541b612f50a257edf479ed

  • SHA512

    7a46606fdee4cba397f5c6ebcda620b9597011b97780e275fa1fdce3392c6abaac984673a842b62f1be6fd8b050635a14aa73fc378ac9dbc16bddbc039708dd5

  • SSDEEP

    12288:jMr6y90XSrTOYUHpyZ97PpoiuYPg7MUJkvBB7olGUgYAi6A:1yfHO9o9dvnKMfBB0tQA

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      0e6da712b04d13acae654a7ca287c30f50fda3a3ca541b612f50a257edf479ed

    • Size

      539KB

    • MD5

      208f15658776879ab057845447f79919

    • SHA1

      a12f7dbe1129222b9357560d3c0df9f445bf19ad

    • SHA256

      0e6da712b04d13acae654a7ca287c30f50fda3a3ca541b612f50a257edf479ed

    • SHA512

      7a46606fdee4cba397f5c6ebcda620b9597011b97780e275fa1fdce3392c6abaac984673a842b62f1be6fd8b050635a14aa73fc378ac9dbc16bddbc039708dd5

    • SSDEEP

      12288:jMr6y90XSrTOYUHpyZ97PpoiuYPg7MUJkvBB7olGUgYAi6A:1yfHO9o9dvnKMfBB0tQA

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks