General
-
Target
4b06a50e78291ffb4c0195b5f1f5891fddda9e6e3d7d18c76501139210fb16d6
-
Size
559KB
-
Sample
241104-q3xt2szmax
-
MD5
cc3a7b3c8393383eda9a8df535ac2575
-
SHA1
bf34cd86eb21ba07b3a0a5b788304261e67bea33
-
SHA256
4b06a50e78291ffb4c0195b5f1f5891fddda9e6e3d7d18c76501139210fb16d6
-
SHA512
94a89727db3c8a0744f34b50c763ab45d78406618f85541ed89b091b99306ea86eea5d72dac61bab146b5de5fa7da5914c31aa76a5edb6823ce3677bc01a0a52
-
SSDEEP
12288:ty90QV81xvppi0Tctmm9S+sc0XQyDDzgyxmnCWf5U:tyU1VppintA+iQ6Dz5xmCWfe
Static task
static1
Behavioral task
behavioral1
Sample
4b06a50e78291ffb4c0195b5f1f5891fddda9e6e3d7d18c76501139210fb16d6.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
4b06a50e78291ffb4c0195b5f1f5891fddda9e6e3d7d18c76501139210fb16d6
-
Size
559KB
-
MD5
cc3a7b3c8393383eda9a8df535ac2575
-
SHA1
bf34cd86eb21ba07b3a0a5b788304261e67bea33
-
SHA256
4b06a50e78291ffb4c0195b5f1f5891fddda9e6e3d7d18c76501139210fb16d6
-
SHA512
94a89727db3c8a0744f34b50c763ab45d78406618f85541ed89b091b99306ea86eea5d72dac61bab146b5de5fa7da5914c31aa76a5edb6823ce3677bc01a0a52
-
SSDEEP
12288:ty90QV81xvppi0Tctmm9S+sc0XQyDDzgyxmnCWf5U:tyU1VppintA+iQ6Dz5xmCWfe
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1