General
-
Target
4ccf7aa77eda98895e7050dd6cc38e39bdc4bb5b0e587f88b250ab359129981f
-
Size
706KB
-
Sample
241110-3vm14a1ken
-
MD5
db9d6abc8ecc702ef73e769ad57257a8
-
SHA1
6d083ad8ef9684de135538281d375b96b3beab05
-
SHA256
4ccf7aa77eda98895e7050dd6cc38e39bdc4bb5b0e587f88b250ab359129981f
-
SHA512
63899f37ef0939456397a6e24de97f7d9e38d2a9f330ff7a631c23151542b8584f59b02b99cbb43f84663c5c0940c7e0cdc62d44209cef19ead2689f4c495b5b
-
SSDEEP
12288:Ey90qdBKriqXwzsyGB+XXrNcTb/KCRkVRpXZtRhv5NclNHEkBN/n:EybOlgkArsb/LRIFhOHTn
Static task
static1
Behavioral task
behavioral1
Sample
4ccf7aa77eda98895e7050dd6cc38e39bdc4bb5b0e587f88b250ab359129981f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
4ccf7aa77eda98895e7050dd6cc38e39bdc4bb5b0e587f88b250ab359129981f
-
Size
706KB
-
MD5
db9d6abc8ecc702ef73e769ad57257a8
-
SHA1
6d083ad8ef9684de135538281d375b96b3beab05
-
SHA256
4ccf7aa77eda98895e7050dd6cc38e39bdc4bb5b0e587f88b250ab359129981f
-
SHA512
63899f37ef0939456397a6e24de97f7d9e38d2a9f330ff7a631c23151542b8584f59b02b99cbb43f84663c5c0940c7e0cdc62d44209cef19ead2689f4c495b5b
-
SSDEEP
12288:Ey90qdBKriqXwzsyGB+XXrNcTb/KCRkVRpXZtRhv5NclNHEkBN/n:EybOlgkArsb/LRIFhOHTn
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1