General
-
Target
7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354
-
Size
696KB
-
Sample
240424-wfj8bsec6v
-
MD5
4ca06158407b9d95c86f42dbb09487f4
-
SHA1
d16920e8b6a12e631d3be57be69d2038f1236813
-
SHA256
7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354
-
SHA512
1b0f9cc86ae32c4789349edaa17b75b8dde3e500a97b32db5c55db4d4ca8bbc17c5aa4dbc5ea0bfc89ca6d8267bd21754236bb0e4e09de1bc84428d7fe005324
-
SSDEEP
12288:jy90CgQx7nUfjX/OPqVQqT3hxKjOuYYEcYrUHVJH4:jyBKjX/OSVlD9uY12s
Static task
static1
Behavioral task
behavioral1
Sample
7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354
-
Size
696KB
-
MD5
4ca06158407b9d95c86f42dbb09487f4
-
SHA1
d16920e8b6a12e631d3be57be69d2038f1236813
-
SHA256
7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354
-
SHA512
1b0f9cc86ae32c4789349edaa17b75b8dde3e500a97b32db5c55db4d4ca8bbc17c5aa4dbc5ea0bfc89ca6d8267bd21754236bb0e4e09de1bc84428d7fe005324
-
SSDEEP
12288:jy90CgQx7nUfjX/OPqVQqT3hxKjOuYYEcYrUHVJH4:jyBKjX/OSVlD9uY12s
-
Detect ZGRat V1
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features
-
Detects executables packed with ConfuserEx Mod
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1