General

  • Target

    4f4daed91469aa415d2316bf892f3ead683b32cf794e9eb1bcbed0fa0180ce52N.exe

  • Size

    379KB

  • Sample

    241111-b3pfcazepb

  • MD5

    2d028131d4cadc760481029f1c3f25c9

  • SHA1

    eff7a413fa90b9bae013369f130ec8ccd5598913

  • SHA256

    a35e831486eb90a6e8c2569593763522608d86385f6cd218ac2fca11fe9cc2c1

  • SHA512

    656d37338793fb2c0fbb1227b171f67aa0e78e54134524895301062b46cd0f840c2dd9189cfd5135aca899cd64087588b39fcaf8350d28e4ab41c3fffafaef23

  • SSDEEP

    6144:Kty+bnr+3p0yN90QEDlQMx85fGVHhr8iDRXpm4Ec2fZH6XfFdC1FXG:XMrvy90fQMBVHhtFZQRHcF81FXG

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Targets

    • Target

      4f4daed91469aa415d2316bf892f3ead683b32cf794e9eb1bcbed0fa0180ce52N.exe

    • Size

      379KB

    • MD5

      2d028131d4cadc760481029f1c3f25c9

    • SHA1

      eff7a413fa90b9bae013369f130ec8ccd5598913

    • SHA256

      a35e831486eb90a6e8c2569593763522608d86385f6cd218ac2fca11fe9cc2c1

    • SHA512

      656d37338793fb2c0fbb1227b171f67aa0e78e54134524895301062b46cd0f840c2dd9189cfd5135aca899cd64087588b39fcaf8350d28e4ab41c3fffafaef23

    • SSDEEP

      6144:Kty+bnr+3p0yN90QEDlQMx85fGVHhr8iDRXpm4Ec2fZH6XfFdC1FXG:XMrvy90fQMBVHhtFZQRHcF81FXG

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks