General
-
Target
6c1021bb71cabb8336ffa38d3542cc1a38ac4d5d097d931b6eb599ab4374e13b
-
Size
1.5MB
-
Sample
241111-a9c58askbk
-
MD5
67037380cab77026158e5cc1f1b8731b
-
SHA1
8164df60ae64bf20deaea7f762b68db74a108506
-
SHA256
6c1021bb71cabb8336ffa38d3542cc1a38ac4d5d097d931b6eb599ab4374e13b
-
SHA512
499664bc53f7379bdc6b7069191c42f33dbd9425b80adfa5eff79e464fe984610c11f6f581218441509c0866d325811eb8f38e3836c8bdfe466dc8d7f078b5e7
-
SSDEEP
49152:WldPMZA1s9/YVYtji00AFexXiTYU8YBvXl2g:451a/dL0AFeVHU8YBd
Static task
static1
Behavioral task
behavioral1
Sample
6c1021bb71cabb8336ffa38d3542cc1a38ac4d5d097d931b6eb599ab4374e13b.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6c1021bb71cabb8336ffa38d3542cc1a38ac4d5d097d931b6eb599ab4374e13b
-
Size
1.5MB
-
MD5
67037380cab77026158e5cc1f1b8731b
-
SHA1
8164df60ae64bf20deaea7f762b68db74a108506
-
SHA256
6c1021bb71cabb8336ffa38d3542cc1a38ac4d5d097d931b6eb599ab4374e13b
-
SHA512
499664bc53f7379bdc6b7069191c42f33dbd9425b80adfa5eff79e464fe984610c11f6f581218441509c0866d325811eb8f38e3836c8bdfe466dc8d7f078b5e7
-
SSDEEP
49152:WldPMZA1s9/YVYtji00AFexXiTYU8YBvXl2g:451a/dL0AFeVHU8YBd
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1