General
-
Target
ceb6aeec4ed9a9b5e836db8f61e251234940b62e015e2f0a3560b95ab79c2ef1
-
Size
931KB
-
Sample
241111-avmq4sycjr
-
MD5
739e320b0b517cdee3033a018a753609
-
SHA1
dd952e0bb677569878108c6b3ee76edb997d8836
-
SHA256
ceb6aeec4ed9a9b5e836db8f61e251234940b62e015e2f0a3560b95ab79c2ef1
-
SHA512
49d0e2d5aee6d1999a069a70644f7d28918241b8186f77e3bfa7e0f26a2e3434f0e643d86899e2e09e6d4c49c45fc3092e4ed98fa6519f7061ecae8b88f5f3d8
-
SSDEEP
24576:vqGBYOCrAPZg7ov0aR3S8rljm3XWwG9JG:cOCrAd0aR3S8pjmHWw
Static task
static1
Behavioral task
behavioral1
Sample
ceb6aeec4ed9a9b5e836db8f61e251234940b62e015e2f0a3560b95ab79c2ef1.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ceb6aeec4ed9a9b5e836db8f61e251234940b62e015e2f0a3560b95ab79c2ef1.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ceb6aeec4ed9a9b5e836db8f61e251234940b62e015e2f0a3560b95ab79c2ef1
-
Size
931KB
-
MD5
739e320b0b517cdee3033a018a753609
-
SHA1
dd952e0bb677569878108c6b3ee76edb997d8836
-
SHA256
ceb6aeec4ed9a9b5e836db8f61e251234940b62e015e2f0a3560b95ab79c2ef1
-
SHA512
49d0e2d5aee6d1999a069a70644f7d28918241b8186f77e3bfa7e0f26a2e3434f0e643d86899e2e09e6d4c49c45fc3092e4ed98fa6519f7061ecae8b88f5f3d8
-
SSDEEP
24576:vqGBYOCrAPZg7ov0aR3S8rljm3XWwG9JG:cOCrAd0aR3S8pjmHWw
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1