General
-
Target
cbb377550aa4560e976bc8efd8f39309ee69594bf3823efa2d21d821fee3efe8
-
Size
1.5MB
-
Sample
241029-re6ygswcmh
-
MD5
ad39b7a2270e3b6fbf5a6dd50f48a487
-
SHA1
c1491b19e448b7afcada102b6e447989b3ea32ca
-
SHA256
cbb377550aa4560e976bc8efd8f39309ee69594bf3823efa2d21d821fee3efe8
-
SHA512
acb9dc0bd603c8fe3062fb2eacaad0321625c56c1fc23482e8f174daf7654591c2ce21fae04a4db82c317c376602ffc372c9e85615380c7af1dd0c6faf7661eb
-
SSDEEP
49152:IyHUdnAePtIm60ohZseZBMRH5G6V7OQniE:xHUdn3Gm60ZmBMpg6VC8iE
Static task
static1
Behavioral task
behavioral1
Sample
cbb377550aa4560e976bc8efd8f39309ee69594bf3823efa2d21d821fee3efe8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cbb377550aa4560e976bc8efd8f39309ee69594bf3823efa2d21d821fee3efe8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
cbb377550aa4560e976bc8efd8f39309ee69594bf3823efa2d21d821fee3efe8.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
cbb377550aa4560e976bc8efd8f39309ee69594bf3823efa2d21d821fee3efe8.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
cbb377550aa4560e976bc8efd8f39309ee69594bf3823efa2d21d821fee3efe8
-
Size
1.5MB
-
MD5
ad39b7a2270e3b6fbf5a6dd50f48a487
-
SHA1
c1491b19e448b7afcada102b6e447989b3ea32ca
-
SHA256
cbb377550aa4560e976bc8efd8f39309ee69594bf3823efa2d21d821fee3efe8
-
SHA512
acb9dc0bd603c8fe3062fb2eacaad0321625c56c1fc23482e8f174daf7654591c2ce21fae04a4db82c317c376602ffc372c9e85615380c7af1dd0c6faf7661eb
-
SSDEEP
49152:IyHUdnAePtIm60ohZseZBMRH5G6V7OQniE:xHUdn3Gm60ZmBMpg6VC8iE
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1