General
-
Target
93bce7ec363c152c82dded20d5181fa2ef5d7b32d1e0c35a10683a29b684df9f
-
Size
618KB
-
Sample
241104-qlgrhasqbj
-
MD5
ce78459e2ec9377946e455fb9cfdb91b
-
SHA1
10608e957a3d38b9cda0422cdd6593ed83786aa8
-
SHA256
93bce7ec363c152c82dded20d5181fa2ef5d7b32d1e0c35a10683a29b684df9f
-
SHA512
f40a9e6820e64e725a31a179e80047e8ed7c658be6da239f387b5c0aa0e7099bd78dd4b293f982a521f8f64b23f2ed820a2a4d7636927a498c4073a4ab814328
-
SSDEEP
12288:cy907cPLTe+O/xCufv4cu63NiThsVJed2FNBKMqngb:cyRLC+O/Ac4cu6dMhsVJed2XB1qn8
Static task
static1
Behavioral task
behavioral1
Sample
93bce7ec363c152c82dded20d5181fa2ef5d7b32d1e0c35a10683a29b684df9f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
93bce7ec363c152c82dded20d5181fa2ef5d7b32d1e0c35a10683a29b684df9f
-
Size
618KB
-
MD5
ce78459e2ec9377946e455fb9cfdb91b
-
SHA1
10608e957a3d38b9cda0422cdd6593ed83786aa8
-
SHA256
93bce7ec363c152c82dded20d5181fa2ef5d7b32d1e0c35a10683a29b684df9f
-
SHA512
f40a9e6820e64e725a31a179e80047e8ed7c658be6da239f387b5c0aa0e7099bd78dd4b293f982a521f8f64b23f2ed820a2a4d7636927a498c4073a4ab814328
-
SSDEEP
12288:cy907cPLTe+O/xCufv4cu63NiThsVJed2FNBKMqngb:cyRLC+O/Ac4cu6dMhsVJed2XB1qn8
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1