General
-
Target
9960dfa29143879b82c7ea61601a00160b291cbf3255156d5248ce7a22169901
-
Size
697KB
-
Sample
241110-3hgcsazrbr
-
MD5
0fa0ad8471cbf864b998f93fe9c29aae
-
SHA1
0effb41c1a9f574694597705462bdd769cbc0dae
-
SHA256
9960dfa29143879b82c7ea61601a00160b291cbf3255156d5248ce7a22169901
-
SHA512
cd660df44b629041763a9f479bd63c6b2f940eb8f691d08e275a699838ded7abb6b1220d7423c779eead216564cb1d494c1aa5d9b7a3773280659f050b1d99b5
-
SSDEEP
12288:fy90SuCAWF5FIppSm795w7Z0NqB8uYCEcY4OvprlkxSLUNxP:fyggtImC70Z2JuYftr0X
Static task
static1
Behavioral task
behavioral1
Sample
9960dfa29143879b82c7ea61601a00160b291cbf3255156d5248ce7a22169901.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9960dfa29143879b82c7ea61601a00160b291cbf3255156d5248ce7a22169901
-
Size
697KB
-
MD5
0fa0ad8471cbf864b998f93fe9c29aae
-
SHA1
0effb41c1a9f574694597705462bdd769cbc0dae
-
SHA256
9960dfa29143879b82c7ea61601a00160b291cbf3255156d5248ce7a22169901
-
SHA512
cd660df44b629041763a9f479bd63c6b2f940eb8f691d08e275a699838ded7abb6b1220d7423c779eead216564cb1d494c1aa5d9b7a3773280659f050b1d99b5
-
SSDEEP
12288:fy90SuCAWF5FIppSm795w7Z0NqB8uYCEcY4OvprlkxSLUNxP:fyggtImC70Z2JuYftr0X
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1