General
-
Target
6b6a0dc7e2cc360b4ae85ad1239e68561699bd53f075d81fd8c9cc3cccceb576
-
Size
559KB
-
Sample
241110-2d9cbszmam
-
MD5
6ed679099aa46ea7148f9c14f379b4c6
-
SHA1
deddffc49e5d50c02289edd5baf727ea1160aaf3
-
SHA256
6b6a0dc7e2cc360b4ae85ad1239e68561699bd53f075d81fd8c9cc3cccceb576
-
SHA512
56111058403f243aafbdcd157cef9564320c9419fbee883624b2ff7d6c00cc285db7dae59b2750dc2a0adbf8368f282cd443f34003bc22734331dac5882ab911
-
SSDEEP
12288:dy90VbJULdu9/89pgcB6uvfEce/mxQzTK13udI:dySJbs6ruvcQQzu3R
Static task
static1
Behavioral task
behavioral1
Sample
6b6a0dc7e2cc360b4ae85ad1239e68561699bd53f075d81fd8c9cc3cccceb576.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6b6a0dc7e2cc360b4ae85ad1239e68561699bd53f075d81fd8c9cc3cccceb576
-
Size
559KB
-
MD5
6ed679099aa46ea7148f9c14f379b4c6
-
SHA1
deddffc49e5d50c02289edd5baf727ea1160aaf3
-
SHA256
6b6a0dc7e2cc360b4ae85ad1239e68561699bd53f075d81fd8c9cc3cccceb576
-
SHA512
56111058403f243aafbdcd157cef9564320c9419fbee883624b2ff7d6c00cc285db7dae59b2750dc2a0adbf8368f282cd443f34003bc22734331dac5882ab911
-
SSDEEP
12288:dy90VbJULdu9/89pgcB6uvfEce/mxQzTK13udI:dySJbs6ruvcQQzu3R
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1