General

  • Target

    2387c4d0051580a721a8026307badd61813d4d195587df686152d1f4df2c459a

  • Size

    556KB

  • Sample

    241104-qzmjxatjal

  • MD5

    655a14febdf3676c12c9b490e1bafd1b

  • SHA1

    ab41a43ec0be05edcc2462705ab98f0725ed7259

  • SHA256

    2387c4d0051580a721a8026307badd61813d4d195587df686152d1f4df2c459a

  • SHA512

    430367184c33504de8cfc3fe5dc726ef8513026cbd1f88b09e9e5ed59c96f9ed12fa2955717195be0945670385726037f7d029e4600d4b12848b195fdd95a0fe

  • SSDEEP

    12288:6Mr0y90g4hHhKhTAYj0J6PMjGoQHOefMoueBQKS1:Wyb4hHAdDj00PMjWHOGu9KS1

Malware Config

Extracted

Family

redline

Botnet

dubik

C2

193.233.20.17:4139

Attributes
  • auth_value

    05136deb26ad700ca57d43b1de454f46

Targets

    • Target

      2387c4d0051580a721a8026307badd61813d4d195587df686152d1f4df2c459a

    • Size

      556KB

    • MD5

      655a14febdf3676c12c9b490e1bafd1b

    • SHA1

      ab41a43ec0be05edcc2462705ab98f0725ed7259

    • SHA256

      2387c4d0051580a721a8026307badd61813d4d195587df686152d1f4df2c459a

    • SHA512

      430367184c33504de8cfc3fe5dc726ef8513026cbd1f88b09e9e5ed59c96f9ed12fa2955717195be0945670385726037f7d029e4600d4b12848b195fdd95a0fe

    • SSDEEP

      12288:6Mr0y90g4hHhKhTAYj0J6PMjGoQHOefMoueBQKS1:Wyb4hHAdDj00PMjWHOGu9KS1

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks