General
-
Target
e3bd10f3eb4bed73e4cc471b192ebc22d4915314670fa830484d0d8b8220e32f
-
Size
695KB
-
Sample
241104-rgk4sszpbz
-
MD5
c418d42c8b038b09460505a9eb7f28f6
-
SHA1
90046f1d3449452bc4a383fba28d468fc5854232
-
SHA256
e3bd10f3eb4bed73e4cc471b192ebc22d4915314670fa830484d0d8b8220e32f
-
SHA512
a5b83c4439db9bf75559e68f861361c94e5198b93f9646f932caa85068eb95d92c89ea6b546d56c87a6468093c2c45f05ae56c07d6f606dfabf9bbec844d8d9d
-
SSDEEP
12288:hy90l5mL5cKuG/vfdu4B+CmK40uYeUcYwEee9IJBl:hyLL5Tb/duO+CmiuYfAeuzl
Static task
static1
Behavioral task
behavioral1
Sample
e3bd10f3eb4bed73e4cc471b192ebc22d4915314670fa830484d0d8b8220e32f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e3bd10f3eb4bed73e4cc471b192ebc22d4915314670fa830484d0d8b8220e32f
-
Size
695KB
-
MD5
c418d42c8b038b09460505a9eb7f28f6
-
SHA1
90046f1d3449452bc4a383fba28d468fc5854232
-
SHA256
e3bd10f3eb4bed73e4cc471b192ebc22d4915314670fa830484d0d8b8220e32f
-
SHA512
a5b83c4439db9bf75559e68f861361c94e5198b93f9646f932caa85068eb95d92c89ea6b546d56c87a6468093c2c45f05ae56c07d6f606dfabf9bbec844d8d9d
-
SSDEEP
12288:hy90l5mL5cKuG/vfdu4B+CmK40uYeUcYwEee9IJBl:hyLL5Tb/duO+CmiuYfAeuzl
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1