General
-
Target
6c807444608823f3445ec74745837f134c5d1dd4d42c64fda02c9adec78f6ae2
-
Size
691KB
-
Sample
241104-qk7ljazjgw
-
MD5
4039ec61d4dbb84cecc93208c4009539
-
SHA1
1ee91bc70fc2f9fdde3d1a7642955d9929b3a88e
-
SHA256
6c807444608823f3445ec74745837f134c5d1dd4d42c64fda02c9adec78f6ae2
-
SHA512
f24c7d443c7d96b471ca07f35afe654ee1517c40f64f4ff499c2c15b895e9497b67e2cff27563f111a6430d5c99f15b1b04ea728c6173b4cd8e9b5a0a9d891fe
-
SSDEEP
12288:/y90qFZTkgNtmd4rAVWhsfVu0TaOh70i80crm2KmAUGlQrCM:/ytFRvNtAVWhsfVpTN4lq2KhUTOM
Static task
static1
Behavioral task
behavioral1
Sample
6c807444608823f3445ec74745837f134c5d1dd4d42c64fda02c9adec78f6ae2.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6c807444608823f3445ec74745837f134c5d1dd4d42c64fda02c9adec78f6ae2
-
Size
691KB
-
MD5
4039ec61d4dbb84cecc93208c4009539
-
SHA1
1ee91bc70fc2f9fdde3d1a7642955d9929b3a88e
-
SHA256
6c807444608823f3445ec74745837f134c5d1dd4d42c64fda02c9adec78f6ae2
-
SHA512
f24c7d443c7d96b471ca07f35afe654ee1517c40f64f4ff499c2c15b895e9497b67e2cff27563f111a6430d5c99f15b1b04ea728c6173b4cd8e9b5a0a9d891fe
-
SSDEEP
12288:/y90qFZTkgNtmd4rAVWhsfVu0TaOh70i80crm2KmAUGlQrCM:/ytFRvNtAVWhsfVpTN4lq2KhUTOM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1