General
-
Target
0339905c8bf3f9bf516b34b943617b08385c97f299d72a39c1af7689f5077a89
-
Size
479KB
-
Sample
241104-rbslpa1aph
-
MD5
aaa6707015e652156725a7089893ed5e
-
SHA1
b1331420da7c5cba309d9aa5e9b104401556e075
-
SHA256
0339905c8bf3f9bf516b34b943617b08385c97f299d72a39c1af7689f5077a89
-
SHA512
4ca6db923632da286d8f58023a01f5edc184fefafe11fdb44059f3e04d11a8e9964a318301b623746d85ed8a4313d97aac6c1998769eb4f5de62947a9a3208ff
-
SSDEEP
12288:JMrZy90JX2Lx15g2MqJQ5Qb64ShdFygvz4NTSDMp0mqp1:Mylr5g2FK+0hdkg0TSDMpSp1
Static task
static1
Behavioral task
behavioral1
Sample
0339905c8bf3f9bf516b34b943617b08385c97f299d72a39c1af7689f5077a89.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
0339905c8bf3f9bf516b34b943617b08385c97f299d72a39c1af7689f5077a89
-
Size
479KB
-
MD5
aaa6707015e652156725a7089893ed5e
-
SHA1
b1331420da7c5cba309d9aa5e9b104401556e075
-
SHA256
0339905c8bf3f9bf516b34b943617b08385c97f299d72a39c1af7689f5077a89
-
SHA512
4ca6db923632da286d8f58023a01f5edc184fefafe11fdb44059f3e04d11a8e9964a318301b623746d85ed8a4313d97aac6c1998769eb4f5de62947a9a3208ff
-
SSDEEP
12288:JMrZy90JX2Lx15g2MqJQ5Qb64ShdFygvz4NTSDMp0mqp1:Mylr5g2FK+0hdkg0TSDMpSp1
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1