General
-
Target
df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256
-
Size
566KB
-
Sample
241109-fmxh8syape
-
MD5
8fd8b2bffe6e66aef0b58abea7b0f468
-
SHA1
4899c1c07ed40677d89afdd37808cbde22cccf6c
-
SHA256
df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256
-
SHA512
afb22502b7a04f20d0d82e3abb747dbb37540e1ccf44fb4cb154a204fdd3cecb55442791eb6ddb44f4be9ffb4e48f99db4cec6b5f2c09ff12f89bab4dba412ef
-
SSDEEP
12288:0y90jHsxLvLnKJYZneJMsEtjEAzuZGF/RvXTZvV:0yb5KJYsJxEtjESuZSnd
Static task
static1
Behavioral task
behavioral1
Sample
df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256
-
Size
566KB
-
MD5
8fd8b2bffe6e66aef0b58abea7b0f468
-
SHA1
4899c1c07ed40677d89afdd37808cbde22cccf6c
-
SHA256
df9216c1dc6901a6d72436c0c48f1d121adf3b1ed32938d67c722e1a557bb256
-
SHA512
afb22502b7a04f20d0d82e3abb747dbb37540e1ccf44fb4cb154a204fdd3cecb55442791eb6ddb44f4be9ffb4e48f99db4cec6b5f2c09ff12f89bab4dba412ef
-
SSDEEP
12288:0y90jHsxLvLnKJYZneJMsEtjEAzuZGF/RvXTZvV:0yb5KJYsJxEtjESuZSnd
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1