General
-
Target
406fb3b59f61b94bfd3a0d75e5a83db811dcfc9368408a707758e1e44a79d90c
-
Size
698KB
-
Sample
241110-3qq7ysxhkb
-
MD5
5bea3e6068d9445a669b02cd9836d512
-
SHA1
c2817c078e99c8ae308eda2c8eb899b6bdf55a11
-
SHA256
406fb3b59f61b94bfd3a0d75e5a83db811dcfc9368408a707758e1e44a79d90c
-
SHA512
29a01095d948cf69844de0fdd53c147b3eb6de8a63d960dca55fea1cb9f236d0e6f52689d2870c22e0f701087a06b8e8f3c8c0aa020bc7e14848c252d1977b83
-
SSDEEP
12288:Ny90sYWTiqn/hnZGDBGYU7XxCy3CdCd7u91nc8HHNuYlEcYdU1uV0sAb:Ny4Wmq/V+BGYqbydCd7u/TNuYa6uCB
Static task
static1
Behavioral task
behavioral1
Sample
406fb3b59f61b94bfd3a0d75e5a83db811dcfc9368408a707758e1e44a79d90c.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
406fb3b59f61b94bfd3a0d75e5a83db811dcfc9368408a707758e1e44a79d90c
-
Size
698KB
-
MD5
5bea3e6068d9445a669b02cd9836d512
-
SHA1
c2817c078e99c8ae308eda2c8eb899b6bdf55a11
-
SHA256
406fb3b59f61b94bfd3a0d75e5a83db811dcfc9368408a707758e1e44a79d90c
-
SHA512
29a01095d948cf69844de0fdd53c147b3eb6de8a63d960dca55fea1cb9f236d0e6f52689d2870c22e0f701087a06b8e8f3c8c0aa020bc7e14848c252d1977b83
-
SSDEEP
12288:Ny90sYWTiqn/hnZGDBGYU7XxCy3CdCd7u91nc8HHNuYlEcYdU1uV0sAb:Ny4Wmq/V+BGYqbydCd7u/TNuYa6uCB
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1