General

  • Target

    6cdfa134ea5ec457ddd70aaca44c371fff2f4ecb0d1c492224e438db40ecfffa

  • Size

    1000KB

  • Sample

    241110-3prgbsxemr

  • MD5

    2d3a2eb1cc97aabf32a3eb07cc685837

  • SHA1

    a66a41bd4b6bf0c3a91a65c971d2b804690c5d3d

  • SHA256

    6cdfa134ea5ec457ddd70aaca44c371fff2f4ecb0d1c492224e438db40ecfffa

  • SHA512

    7f34056385db0d7e6387d1cafc9eae41015a7c591b5e642f8870d746e076c95a258ed18890a72f73a3d75e65aec4d219c4053e32fcab1162dc4f4df0c8edcae0

  • SSDEEP

    24576:bym4Y46VJi6/9RfDMxm7ssOz7n4gUK85k:Om4F6zZ1RfDIJT4T

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Targets

    • Target

      6cdfa134ea5ec457ddd70aaca44c371fff2f4ecb0d1c492224e438db40ecfffa

    • Size

      1000KB

    • MD5

      2d3a2eb1cc97aabf32a3eb07cc685837

    • SHA1

      a66a41bd4b6bf0c3a91a65c971d2b804690c5d3d

    • SHA256

      6cdfa134ea5ec457ddd70aaca44c371fff2f4ecb0d1c492224e438db40ecfffa

    • SHA512

      7f34056385db0d7e6387d1cafc9eae41015a7c591b5e642f8870d746e076c95a258ed18890a72f73a3d75e65aec4d219c4053e32fcab1162dc4f4df0c8edcae0

    • SSDEEP

      24576:bym4Y46VJi6/9RfDMxm7ssOz7n4gUK85k:Om4F6zZ1RfDIJT4T

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks