General
-
Target
ddbec2b8f0d905317fa09eaba8ca4e7a3aa25fd8debc629c0a85f99b4dce6a43
-
Size
697KB
-
Sample
241110-1892nszlcm
-
MD5
fcf96c8b5d77de34dd1819111a3144c9
-
SHA1
cb391d5b85d3b777cb4aff24de47cbb0103dbf12
-
SHA256
ddbec2b8f0d905317fa09eaba8ca4e7a3aa25fd8debc629c0a85f99b4dce6a43
-
SHA512
8cff46b7b16cfbcc6d68cca2f9ccdae99f135d1dee984a2fb7a88178c3e193ee5200ea7b44f696dc6b5499ed1c2d32e0e7c3890cb180cf9c2fa48be10bc78a26
-
SSDEEP
12288:jy90kNC8Z5Z0Qsl2Bae3R/rvxeZWP3mmwlaZTAadZzkMdvfMHTNmOGIZljmh:jyroUWQogLt3mgUagMhsQeZla
Static task
static1
Behavioral task
behavioral1
Sample
ddbec2b8f0d905317fa09eaba8ca4e7a3aa25fd8debc629c0a85f99b4dce6a43.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ddbec2b8f0d905317fa09eaba8ca4e7a3aa25fd8debc629c0a85f99b4dce6a43
-
Size
697KB
-
MD5
fcf96c8b5d77de34dd1819111a3144c9
-
SHA1
cb391d5b85d3b777cb4aff24de47cbb0103dbf12
-
SHA256
ddbec2b8f0d905317fa09eaba8ca4e7a3aa25fd8debc629c0a85f99b4dce6a43
-
SHA512
8cff46b7b16cfbcc6d68cca2f9ccdae99f135d1dee984a2fb7a88178c3e193ee5200ea7b44f696dc6b5499ed1c2d32e0e7c3890cb180cf9c2fa48be10bc78a26
-
SSDEEP
12288:jy90kNC8Z5Z0Qsl2Bae3R/rvxeZWP3mmwlaZTAadZzkMdvfMHTNmOGIZljmh:jyroUWQogLt3mgUagMhsQeZla
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1