General
-
Target
35c34e718644b629f42129c03718e3bf87d744ec91bfe8bd72cc6b99c3b6ed2e
-
Size
566KB
-
Sample
241104-qxhg6ssrer
-
MD5
f80e71cee81246ac1632b12b9ea5bac8
-
SHA1
2008e338124bd90c2f3521df6d335c98dcbeabb2
-
SHA256
35c34e718644b629f42129c03718e3bf87d744ec91bfe8bd72cc6b99c3b6ed2e
-
SHA512
cb9d24459c3a86d73750a638c88a4f7c80f9b7f40b8d4048b34ac6831da7914e04c305bbe7dac5e309e29f9a597a2ef63366ceb4deb2ae46f2519520f1b0e416
-
SSDEEP
12288:Sy90i2894wc/Ec7q413qaAnfiG1B5EydJ1tPMX9Hq:Syj94w8EcuEiiG1B5E2/tP29K
Static task
static1
Behavioral task
behavioral1
Sample
35c34e718644b629f42129c03718e3bf87d744ec91bfe8bd72cc6b99c3b6ed2e.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
35c34e718644b629f42129c03718e3bf87d744ec91bfe8bd72cc6b99c3b6ed2e
-
Size
566KB
-
MD5
f80e71cee81246ac1632b12b9ea5bac8
-
SHA1
2008e338124bd90c2f3521df6d335c98dcbeabb2
-
SHA256
35c34e718644b629f42129c03718e3bf87d744ec91bfe8bd72cc6b99c3b6ed2e
-
SHA512
cb9d24459c3a86d73750a638c88a4f7c80f9b7f40b8d4048b34ac6831da7914e04c305bbe7dac5e309e29f9a597a2ef63366ceb4deb2ae46f2519520f1b0e416
-
SSDEEP
12288:Sy90i2894wc/Ec7q413qaAnfiG1B5EydJ1tPMX9Hq:Syj94w8EcuEiiG1B5E2/tP29K
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1