General

  • Target

    4016428db29b3ffcfcc9c8b335311e6bc1fb4d4ef8613f3b4561d4be1c39bb58.exe

  • Size

    818KB

  • Sample

    241111-czs5ss1crf

  • MD5

    c1b4a4020272197362c75de67db1a4d2

  • SHA1

    53a2651c4959c87f078016cd15edbe157813e9f4

  • SHA256

    4016428db29b3ffcfcc9c8b335311e6bc1fb4d4ef8613f3b4561d4be1c39bb58

  • SHA512

    3c3a5dc442b9603b70cc340ae62e6059fd265f65d4a103c049ce7fdcb3581c4a96e524669646a886793b8734bbf31fb8b91c61f587030f10d3479722ec9bb87c

  • SSDEEP

    12288:aMr3y90ZcrCqYt4x6fX9cIIu9bym6JLkSYDa/PZ0IDsfjx0oZNtIlGifo3PxUJ:tyBCptk2N3I0by3AW/iGsN0sdPyJ

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Targets

    • Target

      4016428db29b3ffcfcc9c8b335311e6bc1fb4d4ef8613f3b4561d4be1c39bb58.exe

    • Size

      818KB

    • MD5

      c1b4a4020272197362c75de67db1a4d2

    • SHA1

      53a2651c4959c87f078016cd15edbe157813e9f4

    • SHA256

      4016428db29b3ffcfcc9c8b335311e6bc1fb4d4ef8613f3b4561d4be1c39bb58

    • SHA512

      3c3a5dc442b9603b70cc340ae62e6059fd265f65d4a103c049ce7fdcb3581c4a96e524669646a886793b8734bbf31fb8b91c61f587030f10d3479722ec9bb87c

    • SSDEEP

      12288:aMr3y90ZcrCqYt4x6fX9cIIu9bym6JLkSYDa/PZ0IDsfjx0oZNtIlGifo3PxUJ:tyBCptk2N3I0by3AW/iGsN0sdPyJ

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks