General

  • Target

    ec6fbcd8350236d97b1c63e201017ae410d71d81465cb616d385a6eae4ff972dN.exe

  • Size

    819KB

  • Sample

    241111-ckdrkatkgm

  • MD5

    5d0f1d7c59275481a36e06c5b6dc8c50

  • SHA1

    241e2adfe912334f5cbfd15b96191999d5f82eb2

  • SHA256

    3c2bd32d48025aaca4c36f32ed422ff0ac5f3ab14c7a8c8513ac14c22d55c6e2

  • SHA512

    751112d4014677a1982ae1c9e5f660c3a1e78e6a4c2f38bc0656f0612b8081980b68c9079407f03677b54dcf98f49ec0e2037b35c63b04a8a7c316df5e038053

  • SSDEEP

    12288:4Mrmy90eZThA20jGK00CVxAk4CYmx1SX7bFiRyN3OYT2Yjx01ZNEcxgf:uydP0kVxAk1YFXFioOYTR0Nxgf

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Targets

    • Target

      ec6fbcd8350236d97b1c63e201017ae410d71d81465cb616d385a6eae4ff972dN.exe

    • Size

      819KB

    • MD5

      5d0f1d7c59275481a36e06c5b6dc8c50

    • SHA1

      241e2adfe912334f5cbfd15b96191999d5f82eb2

    • SHA256

      3c2bd32d48025aaca4c36f32ed422ff0ac5f3ab14c7a8c8513ac14c22d55c6e2

    • SHA512

      751112d4014677a1982ae1c9e5f660c3a1e78e6a4c2f38bc0656f0612b8081980b68c9079407f03677b54dcf98f49ec0e2037b35c63b04a8a7c316df5e038053

    • SSDEEP

      12288:4Mrmy90eZThA20jGK00CVxAk4CYmx1SX7bFiRyN3OYT2Yjx01ZNEcxgf:uydP0kVxAk1YFXFioOYTR0Nxgf

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks