General
-
Target
0842411fcbd65a60b4719ea0e2b5ebff76417b27311039c4b46a856d6a26b063
-
Size
376KB
-
Sample
241111-b6g6faypfw
-
MD5
1ec73abb12ea133ee327524d38812b5a
-
SHA1
08e03f09f9cf9c4e711130ce6b8d357032e52c96
-
SHA256
0842411fcbd65a60b4719ea0e2b5ebff76417b27311039c4b46a856d6a26b063
-
SHA512
ce703a88794a196da5e6a2e1208b698e36905b8be956a26d06ee310ded0c9df0d0b473001a04698d7d0c01a6a81fa37f842a18895e12a8f6f8f94e0b53d8c855
-
SSDEEP
6144:Kly+bnr+Cp0yN90QEZw9VQLrTj5sItAcC1typI9ULWv4Tr3S2MCerwRP8g2JAnXO:TMrqy90rNbtlAc2gI95v4/C2n0i+
Static task
static1
Behavioral task
behavioral1
Sample
0842411fcbd65a60b4719ea0e2b5ebff76417b27311039c4b46a856d6a26b063.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
0842411fcbd65a60b4719ea0e2b5ebff76417b27311039c4b46a856d6a26b063
-
Size
376KB
-
MD5
1ec73abb12ea133ee327524d38812b5a
-
SHA1
08e03f09f9cf9c4e711130ce6b8d357032e52c96
-
SHA256
0842411fcbd65a60b4719ea0e2b5ebff76417b27311039c4b46a856d6a26b063
-
SHA512
ce703a88794a196da5e6a2e1208b698e36905b8be956a26d06ee310ded0c9df0d0b473001a04698d7d0c01a6a81fa37f842a18895e12a8f6f8f94e0b53d8c855
-
SSDEEP
6144:Kly+bnr+Cp0yN90QEZw9VQLrTj5sItAcC1typI9ULWv4Tr3S2MCerwRP8g2JAnXO:TMrqy90rNbtlAc2gI95v4/C2n0i+
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1