General
-
Target
b846c352bfa28cc9ed2a43e9c414329618c35a7a37a1d83886eba0b72cb6544e
-
Size
566KB
-
Sample
241110-1k6dkswejh
-
MD5
3dd8a7ba2e673eb3688b0df931c8df73
-
SHA1
05c40227606da454d0866a54059d0e25832d719f
-
SHA256
b846c352bfa28cc9ed2a43e9c414329618c35a7a37a1d83886eba0b72cb6544e
-
SHA512
155142a8d24d2b432f5e228648aa84fde503699550e046a7c66844c825f6403fbdc3447891926b4209d4925b1c6fb595f7c84af5bdd75d9e0cde09feec14fc99
-
SSDEEP
12288:Dy90DndBEKygGp11xTDYJjJyd+PqDF9mi6ZlxywiYtLDMKS8z5vt4c:Dyo/GR1kns0q59mimlwu/r9t4c
Static task
static1
Behavioral task
behavioral1
Sample
b846c352bfa28cc9ed2a43e9c414329618c35a7a37a1d83886eba0b72cb6544e.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b846c352bfa28cc9ed2a43e9c414329618c35a7a37a1d83886eba0b72cb6544e
-
Size
566KB
-
MD5
3dd8a7ba2e673eb3688b0df931c8df73
-
SHA1
05c40227606da454d0866a54059d0e25832d719f
-
SHA256
b846c352bfa28cc9ed2a43e9c414329618c35a7a37a1d83886eba0b72cb6544e
-
SHA512
155142a8d24d2b432f5e228648aa84fde503699550e046a7c66844c825f6403fbdc3447891926b4209d4925b1c6fb595f7c84af5bdd75d9e0cde09feec14fc99
-
SSDEEP
12288:Dy90DndBEKygGp11xTDYJjJyd+PqDF9mi6ZlxywiYtLDMKS8z5vt4c:Dyo/GR1kns0q59mimlwu/r9t4c
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1