General
-
Target
cbfa787c31b8d42036795004edee27cff700e83e0de372da035028b41972c55f
-
Size
566KB
-
Sample
241110-z49pnsware
-
MD5
9b48866310cc8c5f7626c9a62c66e5fb
-
SHA1
af124df136edfb9e5468916bb6cc9435560f6c01
-
SHA256
cbfa787c31b8d42036795004edee27cff700e83e0de372da035028b41972c55f
-
SHA512
8c3d47b75537a3820d2fa7d6a0b6c40862aaadff3df13cedfd1081bd624cadb77ca8c49db261e54cb3e1cf3f50fe1bfc6c07a8439fbb78ae50ec2745045568d3
-
SSDEEP
12288:Jy90MAbEd0qL0Me53v0m6PnQ5sHD6xXssu9:JyAbEd0Ie5MfnQqHD6xXsZ
Static task
static1
Behavioral task
behavioral1
Sample
cbfa787c31b8d42036795004edee27cff700e83e0de372da035028b41972c55f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
cbfa787c31b8d42036795004edee27cff700e83e0de372da035028b41972c55f
-
Size
566KB
-
MD5
9b48866310cc8c5f7626c9a62c66e5fb
-
SHA1
af124df136edfb9e5468916bb6cc9435560f6c01
-
SHA256
cbfa787c31b8d42036795004edee27cff700e83e0de372da035028b41972c55f
-
SHA512
8c3d47b75537a3820d2fa7d6a0b6c40862aaadff3df13cedfd1081bd624cadb77ca8c49db261e54cb3e1cf3f50fe1bfc6c07a8439fbb78ae50ec2745045568d3
-
SSDEEP
12288:Jy90MAbEd0qL0Me53v0m6PnQ5sHD6xXssu9:JyAbEd0Ie5MfnQqHD6xXsZ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1