General
-
Target
06571d8a7f41957ff6882192dc1aff35a38c46d91b9dab498de35341c5417547
-
Size
1.2MB
-
Sample
241111-b3mlrasqen
-
MD5
cebc0b377b7291f2718af0e1661173ce
-
SHA1
debe80778f67ca889fbf36495d513a6bc0c73545
-
SHA256
06571d8a7f41957ff6882192dc1aff35a38c46d91b9dab498de35341c5417547
-
SHA512
b98caaa8e49199d02346daab9d400a61e070416acec5cc63eab6dc4f926c1874f58c7253ae4003aa7afd8027eacf49f37370efc4acfc3772a20c79e316754a27
-
SSDEEP
24576:bGxKz+TDUpS+Nmj4NGQpy6X6yzjKdFuU40KUcDL0lNp/bPm:bGMOKSUDNGQp9qKqFR4JUcDLqNp/b
Static task
static1
Behavioral task
behavioral1
Sample
06571d8a7f41957ff6882192dc1aff35a38c46d91b9dab498de35341c5417547.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06571d8a7f41957ff6882192dc1aff35a38c46d91b9dab498de35341c5417547.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
06571d8a7f41957ff6882192dc1aff35a38c46d91b9dab498de35341c5417547
-
Size
1.2MB
-
MD5
cebc0b377b7291f2718af0e1661173ce
-
SHA1
debe80778f67ca889fbf36495d513a6bc0c73545
-
SHA256
06571d8a7f41957ff6882192dc1aff35a38c46d91b9dab498de35341c5417547
-
SHA512
b98caaa8e49199d02346daab9d400a61e070416acec5cc63eab6dc4f926c1874f58c7253ae4003aa7afd8027eacf49f37370efc4acfc3772a20c79e316754a27
-
SSDEEP
24576:bGxKz+TDUpS+Nmj4NGQpy6X6yzjKdFuU40KUcDL0lNp/bPm:bGMOKSUDNGQp9qKqFR4JUcDLqNp/b
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1