General
-
Target
033b3e889226df9d21f548829af3dec1df12899de48a406eb4e29a531d283699
-
Size
746KB
-
Sample
241110-31qn6s1lfl
-
MD5
f0313f1f14e032d835ef044701213d35
-
SHA1
50ecf35d5ba6a290576b412e7bc9a0f9227376ce
-
SHA256
033b3e889226df9d21f548829af3dec1df12899de48a406eb4e29a531d283699
-
SHA512
42e5f0e48da5493cd9fe8dbe0155c31643d24d2858c98edee93c5551ceee766254d212f7ccd8a06c6ad2620ef63e08116d2ea70dad12a18cc1ec633e541b1f4f
-
SSDEEP
12288:8y90jWxQ2PGIg2Xh/Q352MCPjH8bVLoshvl99FFWGIgbK4wqJlfAzI/z:8y9x5PdFXhS51CPjc5LzvD9nTbbKZqfz
Static task
static1
Behavioral task
behavioral1
Sample
033b3e889226df9d21f548829af3dec1df12899de48a406eb4e29a531d283699.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
033b3e889226df9d21f548829af3dec1df12899de48a406eb4e29a531d283699
-
Size
746KB
-
MD5
f0313f1f14e032d835ef044701213d35
-
SHA1
50ecf35d5ba6a290576b412e7bc9a0f9227376ce
-
SHA256
033b3e889226df9d21f548829af3dec1df12899de48a406eb4e29a531d283699
-
SHA512
42e5f0e48da5493cd9fe8dbe0155c31643d24d2858c98edee93c5551ceee766254d212f7ccd8a06c6ad2620ef63e08116d2ea70dad12a18cc1ec633e541b1f4f
-
SSDEEP
12288:8y90jWxQ2PGIg2Xh/Q352MCPjH8bVLoshvl99FFWGIgbK4wqJlfAzI/z:8y9x5PdFXhS51CPjc5LzvD9nTbbKZqfz
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1