General
-
Target
3fabc9e92c2c1f328d0ea07fd8a9cc93f3f9fb7f8dd5010574561e7f8c1cb063
-
Size
674KB
-
Sample
241104-qxmf5azlcz
-
MD5
8cc44867975363568ce9b9877c4f5339
-
SHA1
266676e461dc14a35c5483d7ae78c5fbba59f7e8
-
SHA256
3fabc9e92c2c1f328d0ea07fd8a9cc93f3f9fb7f8dd5010574561e7f8c1cb063
-
SHA512
c3768aa06e1e15f2832670ef6b669d0dae8be07bc08af21553d2d63566ed96fbbcebe2f19075f180151ed704ecdd3632bfd5e4b5e276c0cfe32a0ae413554440
-
SSDEEP
12288:Hy90P2Ksgc4j0ZtJWPCt2liHdKAJowLlu1UEPjzz+BQfeuwadDTt:HyVKsgc4utJWPr6KAyGu1vPjzz4FatTt
Static task
static1
Behavioral task
behavioral1
Sample
3fabc9e92c2c1f328d0ea07fd8a9cc93f3f9fb7f8dd5010574561e7f8c1cb063.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
3fabc9e92c2c1f328d0ea07fd8a9cc93f3f9fb7f8dd5010574561e7f8c1cb063
-
Size
674KB
-
MD5
8cc44867975363568ce9b9877c4f5339
-
SHA1
266676e461dc14a35c5483d7ae78c5fbba59f7e8
-
SHA256
3fabc9e92c2c1f328d0ea07fd8a9cc93f3f9fb7f8dd5010574561e7f8c1cb063
-
SHA512
c3768aa06e1e15f2832670ef6b669d0dae8be07bc08af21553d2d63566ed96fbbcebe2f19075f180151ed704ecdd3632bfd5e4b5e276c0cfe32a0ae413554440
-
SSDEEP
12288:Hy90P2Ksgc4j0ZtJWPCt2liHdKAJowLlu1UEPjzz+BQfeuwadDTt:HyVKsgc4utJWPr6KAyGu1vPjzz4FatTt
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1