General

  • Target

    50829ef563e70e9b342bf979a2aa5148fce8a29b8a0b4f0a3bdd59f47888d2c3

  • Size

    516KB

  • Sample

    241111-cl966atlcr

  • MD5

    7ef65abce815d245cec9482aea14b928

  • SHA1

    232046e7c2e606a555e876180e936b0fd7971b3a

  • SHA256

    50829ef563e70e9b342bf979a2aa5148fce8a29b8a0b4f0a3bdd59f47888d2c3

  • SHA512

    4b8b81a0ff099d245606140d763267d3784d9cd99f58a6b062a85490d5449bb676a8e61e50fa747260d2363bf739f895890582d22743a00b4c0277a11b143226

  • SSDEEP

    12288:jMrky901bjxQB2e5q+Q/I2I86EZkoHHEq5LrbBn:3y+O1g+QZIVENLN

Malware Config

Extracted

Family

redline

Botnet

dubik

C2

193.233.20.17:4139

Attributes
  • auth_value

    05136deb26ad700ca57d43b1de454f46

Targets

    • Target

      50829ef563e70e9b342bf979a2aa5148fce8a29b8a0b4f0a3bdd59f47888d2c3

    • Size

      516KB

    • MD5

      7ef65abce815d245cec9482aea14b928

    • SHA1

      232046e7c2e606a555e876180e936b0fd7971b3a

    • SHA256

      50829ef563e70e9b342bf979a2aa5148fce8a29b8a0b4f0a3bdd59f47888d2c3

    • SHA512

      4b8b81a0ff099d245606140d763267d3784d9cd99f58a6b062a85490d5449bb676a8e61e50fa747260d2363bf739f895890582d22743a00b4c0277a11b143226

    • SSDEEP

      12288:jMrky901bjxQB2e5q+Q/I2I86EZkoHHEq5LrbBn:3y+O1g+QZIVENLN

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks