General
-
Target
3dd66625b334739f1055d7d7836dbdf5c49f1a13a3b9bd6f796e157d4e15bc8d
-
Size
1.2MB
-
Sample
241104-rbjnsa1apd
-
MD5
5cb51c7d6587204ff7b9ca6de81a4fd7
-
SHA1
4359e17c81d4c16f5f8ecead021e85ccb2029589
-
SHA256
3dd66625b334739f1055d7d7836dbdf5c49f1a13a3b9bd6f796e157d4e15bc8d
-
SHA512
7394ee0900cd718219cab82eacc5e8e60deb928e792b99060595d2f62c7c3db64d5f2c0a4614965c20f20e33167546f2b29df5682a9b6bb3775cd234b7c645f4
-
SSDEEP
24576:cCbht9y/vN4jFVkUI4Hiew2ltipvLt87VLLLVxCwaUdw578ObN/4SYrnP4uO:cCz9uyy4Hrw2lt2CxxCwbdw57fQSG
Static task
static1
Behavioral task
behavioral1
Sample
3dd66625b334739f1055d7d7836dbdf5c49f1a13a3b9bd6f796e157d4e15bc8d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3dd66625b334739f1055d7d7836dbdf5c49f1a13a3b9bd6f796e157d4e15bc8d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
3dd66625b334739f1055d7d7836dbdf5c49f1a13a3b9bd6f796e157d4e15bc8d
-
Size
1.2MB
-
MD5
5cb51c7d6587204ff7b9ca6de81a4fd7
-
SHA1
4359e17c81d4c16f5f8ecead021e85ccb2029589
-
SHA256
3dd66625b334739f1055d7d7836dbdf5c49f1a13a3b9bd6f796e157d4e15bc8d
-
SHA512
7394ee0900cd718219cab82eacc5e8e60deb928e792b99060595d2f62c7c3db64d5f2c0a4614965c20f20e33167546f2b29df5682a9b6bb3775cd234b7c645f4
-
SSDEEP
24576:cCbht9y/vN4jFVkUI4Hiew2ltipvLt87VLLLVxCwaUdw578ObN/4SYrnP4uO:cCz9uyy4Hrw2lt2CxxCwbdw57fQSG
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1