General
-
Target
4d7f6c2eae7ed4296c464bd766ac39624281b2910b491c82811c1140b9ea6658
-
Size
706KB
-
Sample
240422-1nnmyagh3v
-
MD5
e3e2ce0f438f98d0ea00ffe6bd872645
-
SHA1
a30c4c4a1d92e19c3c38c093819374ee801ec5f5
-
SHA256
4d7f6c2eae7ed4296c464bd766ac39624281b2910b491c82811c1140b9ea6658
-
SHA512
5e7f80a2202737e107f6608aba6f0c263d5468bdfb703f5916b3a5a8d3c6c28adb0224cc64960c0652b83ea779c62f36306fca3a0ae9d9175291fb78fabe05f6
-
SSDEEP
12288:gy90OIebMzNc6GS6pUymLZ/1TRvTpXzGygrEiUVOVwRDun4:gytIeENc6VLTTRvTpXzyUVimH
Static task
static1
Behavioral task
behavioral1
Sample
4d7f6c2eae7ed4296c464bd766ac39624281b2910b491c82811c1140b9ea6658.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
4d7f6c2eae7ed4296c464bd766ac39624281b2910b491c82811c1140b9ea6658
-
Size
706KB
-
MD5
e3e2ce0f438f98d0ea00ffe6bd872645
-
SHA1
a30c4c4a1d92e19c3c38c093819374ee801ec5f5
-
SHA256
4d7f6c2eae7ed4296c464bd766ac39624281b2910b491c82811c1140b9ea6658
-
SHA512
5e7f80a2202737e107f6608aba6f0c263d5468bdfb703f5916b3a5a8d3c6c28adb0224cc64960c0652b83ea779c62f36306fca3a0ae9d9175291fb78fabe05f6
-
SSDEEP
12288:gy90OIebMzNc6GS6pUymLZ/1TRvTpXzGygrEiUVOVwRDun4:gytIeENc6VLTTRvTpXzyUVimH
-
Detect ZGRat V1
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features
-
Detects executables packed with ConfuserEx Mod
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1