General
-
Target
6a6b8161d9f85426bae2ea8ea7f080fff6a28d0a03d98f11b3f6b2ec330f5905
-
Size
704KB
-
Sample
241110-311t5sybma
-
MD5
c3f8624a527d5f6d9cc280ae64da25ff
-
SHA1
573306e3c80bdfc1bc902d8e5d9f5c527d73940d
-
SHA256
6a6b8161d9f85426bae2ea8ea7f080fff6a28d0a03d98f11b3f6b2ec330f5905
-
SHA512
4e94bb790b12dc5e63707b40f508feba4e4057a1eac81e89d5ede123bcae915c0841489937615aa6c19ad813f2686854b02846a5256dd97f579428aaa28ef506
-
SSDEEP
12288:/y90nvvBol/sfsLM4D8h2AaVHRyEPmRgXlBl4kMWCKi7KNEryBls:/y+vBiI4Ih23HRy/RgX/Gkpo7KNqyw
Static task
static1
Behavioral task
behavioral1
Sample
6a6b8161d9f85426bae2ea8ea7f080fff6a28d0a03d98f11b3f6b2ec330f5905.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6a6b8161d9f85426bae2ea8ea7f080fff6a28d0a03d98f11b3f6b2ec330f5905
-
Size
704KB
-
MD5
c3f8624a527d5f6d9cc280ae64da25ff
-
SHA1
573306e3c80bdfc1bc902d8e5d9f5c527d73940d
-
SHA256
6a6b8161d9f85426bae2ea8ea7f080fff6a28d0a03d98f11b3f6b2ec330f5905
-
SHA512
4e94bb790b12dc5e63707b40f508feba4e4057a1eac81e89d5ede123bcae915c0841489937615aa6c19ad813f2686854b02846a5256dd97f579428aaa28ef506
-
SSDEEP
12288:/y90nvvBol/sfsLM4D8h2AaVHRyEPmRgXlBl4kMWCKi7KNEryBls:/y+vBiI4Ih23HRy/RgX/Gkpo7KNqyw
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1