General

  • Target

    567b3bf5dd6258cd7292caf603d546e860cafe9cfa5f78d853f37af3a0f9af8f

  • Size

    675KB

  • Sample

    241111-az1hrsycqk

  • MD5

    f05dcd5b023f9878f65892269a627f25

  • SHA1

    9a77ee6b4657ffc3ecb3c25f3ba02e99c30ec896

  • SHA256

    567b3bf5dd6258cd7292caf603d546e860cafe9cfa5f78d853f37af3a0f9af8f

  • SHA512

    ded94c1d8412f1be788ce8d21655a1ddce898b4d32eac94eee696adc0f81ef7c6c0e77e2554e364bd34c37c1da7dfaef7ae9fe716e8432736b14ea8cc803e48b

  • SSDEEP

    12288:iMrpy90EIhVHuAdBnk4dOV8XLTqWLIe5u1nK24agQB9F5bUhGndys7x+:vyEVrtk4ZXf/seCKMgQB9eG7M

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Targets

    • Target

      567b3bf5dd6258cd7292caf603d546e860cafe9cfa5f78d853f37af3a0f9af8f

    • Size

      675KB

    • MD5

      f05dcd5b023f9878f65892269a627f25

    • SHA1

      9a77ee6b4657ffc3ecb3c25f3ba02e99c30ec896

    • SHA256

      567b3bf5dd6258cd7292caf603d546e860cafe9cfa5f78d853f37af3a0f9af8f

    • SHA512

      ded94c1d8412f1be788ce8d21655a1ddce898b4d32eac94eee696adc0f81ef7c6c0e77e2554e364bd34c37c1da7dfaef7ae9fe716e8432736b14ea8cc803e48b

    • SSDEEP

      12288:iMrpy90EIhVHuAdBnk4dOV8XLTqWLIe5u1nK24agQB9F5bUhGndys7x+:vyEVrtk4ZXf/seCKMgQB9eG7M

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks