General
-
Target
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a
-
Size
706KB
-
Sample
241029-p2kbwswqel
-
MD5
a57eaa069601c17aff489167c2a819e5
-
SHA1
d9087bc4e79264a8a47324c0a373f3a101c083ee
-
SHA256
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a
-
SHA512
8cd870ca8dd9a5b1fca449d7e960efefd6428f8f71cb7112224a0b2701d2660d97661c208a4438a4423770fb897f8d786797ed42f6691fc72e199d7a47a51657
-
SSDEEP
12288:jy90TiPXDCcW9nLRnB3tcCHzU8j8y+Sr2dg2EoyzPqOzUpNdXtlWRKjp8S:jyQgE9nNB3Nw8WSr2ZTyhzcdXtAcjp8S
Static task
static1
Behavioral task
behavioral1
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a
-
Size
706KB
-
MD5
a57eaa069601c17aff489167c2a819e5
-
SHA1
d9087bc4e79264a8a47324c0a373f3a101c083ee
-
SHA256
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a
-
SHA512
8cd870ca8dd9a5b1fca449d7e960efefd6428f8f71cb7112224a0b2701d2660d97661c208a4438a4423770fb897f8d786797ed42f6691fc72e199d7a47a51657
-
SSDEEP
12288:jy90TiPXDCcW9nLRnB3tcCHzU8j8y+Sr2dg2EoyzPqOzUpNdXtlWRKjp8S:jyQgE9nNB3Nw8WSr2ZTyhzcdXtAcjp8S
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1