General
-
Target
ee408a509b6358041fe0e675fb988c22d0002fb0b83e13543b8d82a60f561be5
-
Size
706KB
-
Sample
241104-qkb5ma1ank
-
MD5
b629fab1d2dae48bf3cd182652bb97a7
-
SHA1
9e1abbd17b7a262b3bbfb4e98a1736168b0abd30
-
SHA256
ee408a509b6358041fe0e675fb988c22d0002fb0b83e13543b8d82a60f561be5
-
SHA512
6f91ea6a49b0c76df32bca581e852805d107156e8f5c5adb5e5681fbfb641c000d281a648e9c7273de915daf370fe5f0d92ed9b6749445c19691b5e1d2e0eba4
-
SSDEEP
12288:Ty90cjv+mnhVCMiWgYmIxJH8Tygq7DqPfVF9midZaN4IiZtSYzwK:Ty5v+mhVNiWgY5Z8G97sfz9mivaylzwK
Static task
static1
Behavioral task
behavioral1
Sample
ee408a509b6358041fe0e675fb988c22d0002fb0b83e13543b8d82a60f561be5.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ee408a509b6358041fe0e675fb988c22d0002fb0b83e13543b8d82a60f561be5
-
Size
706KB
-
MD5
b629fab1d2dae48bf3cd182652bb97a7
-
SHA1
9e1abbd17b7a262b3bbfb4e98a1736168b0abd30
-
SHA256
ee408a509b6358041fe0e675fb988c22d0002fb0b83e13543b8d82a60f561be5
-
SHA512
6f91ea6a49b0c76df32bca581e852805d107156e8f5c5adb5e5681fbfb641c000d281a648e9c7273de915daf370fe5f0d92ed9b6749445c19691b5e1d2e0eba4
-
SSDEEP
12288:Ty90cjv+mnhVCMiWgYmIxJH8Tygq7DqPfVF9midZaN4IiZtSYzwK:Ty5v+mhVNiWgY5Z8G97sfz9mivaylzwK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1