General
-
Target
e09eef40094722739c1aeb26d53637a5a559eefd59b167945aafa108f64f5e63
-
Size
648KB
-
Sample
241110-3qhwks1jer
-
MD5
918e87ad5be168502e70eea86d41d3b0
-
SHA1
d33a493755b3e948e92e286b85c0948021ebaefb
-
SHA256
e09eef40094722739c1aeb26d53637a5a559eefd59b167945aafa108f64f5e63
-
SHA512
87409592fda1a8da1cadffc2bd35c7c0f087ef76086faf6a855b32bba819c04e784357b5b2e4b06e8a825c22ea60d465b09faa6af4ef9f014f7c8a9722677007
-
SSDEEP
12288:Yy90UKSnOPpHbm6c/++mpsdiu6h4MTWnO2mx0b2ADplFv59Zw+vOXjM:YyFKLpHC6cspsEuw4vOb+fpbvnZ/4M
Static task
static1
Behavioral task
behavioral1
Sample
e09eef40094722739c1aeb26d53637a5a559eefd59b167945aafa108f64f5e63.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e09eef40094722739c1aeb26d53637a5a559eefd59b167945aafa108f64f5e63
-
Size
648KB
-
MD5
918e87ad5be168502e70eea86d41d3b0
-
SHA1
d33a493755b3e948e92e286b85c0948021ebaefb
-
SHA256
e09eef40094722739c1aeb26d53637a5a559eefd59b167945aafa108f64f5e63
-
SHA512
87409592fda1a8da1cadffc2bd35c7c0f087ef76086faf6a855b32bba819c04e784357b5b2e4b06e8a825c22ea60d465b09faa6af4ef9f014f7c8a9722677007
-
SSDEEP
12288:Yy90UKSnOPpHbm6c/++mpsdiu6h4MTWnO2mx0b2ADplFv59Zw+vOXjM:YyFKLpHC6cspsEuw4vOb+fpbvnZ/4M
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1