General
-
Target
02a69fcddc0e6a0b5febbcc68901d62d7f82e4fcf0a3bcb5355fc802c041954b
-
Size
1.1MB
-
Sample
240419-wr7g1abe82
-
MD5
18365955fc5cf54859360be58dfb13cb
-
SHA1
743003a6bc293b9da446d6f8d69e1e61d54b751d
-
SHA256
02a69fcddc0e6a0b5febbcc68901d62d7f82e4fcf0a3bcb5355fc802c041954b
-
SHA512
f1473fc3131a4239b7632bee17df41c5f7b8d3254a0095f318bdf7487701c3daa4452b8b2f3eb594efe312e3bb7e0538ce196d4094a24c89f817d7f430b35c40
-
SSDEEP
24576:+yxNAnwVU/LYfbpXf4+6fxgxDNXjbYtb0YUU+XSfY:NrAAGLYjpw+UxgLXjbS0YzIS
Static task
static1
Behavioral task
behavioral1
Sample
02a69fcddc0e6a0b5febbcc68901d62d7f82e4fcf0a3bcb5355fc802c041954b.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
02a69fcddc0e6a0b5febbcc68901d62d7f82e4fcf0a3bcb5355fc802c041954b
-
Size
1.1MB
-
MD5
18365955fc5cf54859360be58dfb13cb
-
SHA1
743003a6bc293b9da446d6f8d69e1e61d54b751d
-
SHA256
02a69fcddc0e6a0b5febbcc68901d62d7f82e4fcf0a3bcb5355fc802c041954b
-
SHA512
f1473fc3131a4239b7632bee17df41c5f7b8d3254a0095f318bdf7487701c3daa4452b8b2f3eb594efe312e3bb7e0538ce196d4094a24c89f817d7f430b35c40
-
SSDEEP
24576:+yxNAnwVU/LYfbpXf4+6fxgxDNXjbYtb0YUU+XSfY:NrAAGLYjpw+UxgLXjbS0YzIS
-
Detect ZGRat V1
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features
-
Detects executables packed with ConfuserEx Mod
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1