General
-
Target
198e27f8c9cc434aad1c69b161cd2834c6e6b468af0e2aae932d32cec88e69d0
-
Size
747KB
-
Sample
241109-f3mzqsydnn
-
MD5
34dabe5f8215cd012534c3be6b9cdf9e
-
SHA1
670728b6b0c5e23dbf86ca4ab291671476a5b960
-
SHA256
198e27f8c9cc434aad1c69b161cd2834c6e6b468af0e2aae932d32cec88e69d0
-
SHA512
e9129c1549692ebca2a967c95e42dc99b3168622a7d94343d291ac376e25176fac9c0f6b55fe6c9713e4051bbab25c233dc406cf4db833a48e5fa185931faaeb
-
SSDEEP
12288:zy90cT8Gu0FH9V7waztJlM5XOfK3JeuL/lFaN5JlD40NP3RXFun8ws6Is:zy3oGu0iqlpS33bfEptNPBXFun8ws6Is
Static task
static1
Behavioral task
behavioral1
Sample
198e27f8c9cc434aad1c69b161cd2834c6e6b468af0e2aae932d32cec88e69d0.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
198e27f8c9cc434aad1c69b161cd2834c6e6b468af0e2aae932d32cec88e69d0
-
Size
747KB
-
MD5
34dabe5f8215cd012534c3be6b9cdf9e
-
SHA1
670728b6b0c5e23dbf86ca4ab291671476a5b960
-
SHA256
198e27f8c9cc434aad1c69b161cd2834c6e6b468af0e2aae932d32cec88e69d0
-
SHA512
e9129c1549692ebca2a967c95e42dc99b3168622a7d94343d291ac376e25176fac9c0f6b55fe6c9713e4051bbab25c233dc406cf4db833a48e5fa185931faaeb
-
SSDEEP
12288:zy90cT8Gu0FH9V7waztJlM5XOfK3JeuL/lFaN5JlD40NP3RXFun8ws6Is:zy3oGu0iqlpS33bfEptNPBXFun8ws6Is
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1