General
-
Target
dcff21ef97fdb0091103d2c9f761b2efc46ce57cab499ec579aaee68e0d54539
-
Size
706KB
-
Sample
241111-argexsybnp
-
MD5
37e6f05d4f0595060c99cc4d85e516dc
-
SHA1
25f890f538fb5b3cc450e12fbb2bd1e2b9aca033
-
SHA256
dcff21ef97fdb0091103d2c9f761b2efc46ce57cab499ec579aaee68e0d54539
-
SHA512
fed1e07e2c9b8bb250119c22872faed527bcd2d6a26c7955420115795eee6b806735bf976041b63eb7bf8ec83925f3ebac9f6790e43d80de9bc79e330a8913df
-
SSDEEP
12288:yy90WePmP6w/hruRB+1/nKsK3+/EHoYdW4drbJY8c09lZihU6OX:yyOPmxhx/S3+/EHHdRrbTcKx6OX
Static task
static1
Behavioral task
behavioral1
Sample
dcff21ef97fdb0091103d2c9f761b2efc46ce57cab499ec579aaee68e0d54539.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
dcff21ef97fdb0091103d2c9f761b2efc46ce57cab499ec579aaee68e0d54539
-
Size
706KB
-
MD5
37e6f05d4f0595060c99cc4d85e516dc
-
SHA1
25f890f538fb5b3cc450e12fbb2bd1e2b9aca033
-
SHA256
dcff21ef97fdb0091103d2c9f761b2efc46ce57cab499ec579aaee68e0d54539
-
SHA512
fed1e07e2c9b8bb250119c22872faed527bcd2d6a26c7955420115795eee6b806735bf976041b63eb7bf8ec83925f3ebac9f6790e43d80de9bc79e330a8913df
-
SSDEEP
12288:yy90WePmP6w/hruRB+1/nKsK3+/EHoYdW4drbJY8c09lZihU6OX:yyOPmxhx/S3+/EHHdRrbTcKx6OX
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1