General
-
Target
dcf90e24387d8b337a07fc17c4060240f170c29a3c97ae74808406a0c3428d3c
-
Size
478KB
-
Sample
241111-bjjqrasmaj
-
MD5
c29f217c0637db404b1aea7ad6302a27
-
SHA1
363c7a68e69a301a6c4f13910492276b5adf5100
-
SHA256
dcf90e24387d8b337a07fc17c4060240f170c29a3c97ae74808406a0c3428d3c
-
SHA512
a8f0a44f29b0f97621fbc3d14ef5b380ab349b313e79dcc90f0893c69a920babad5098ae3d87caae5dd9a6fb3b886e7e6b7956340ebbb79fdcbf3bfd685c5e78
-
SSDEEP
12288:UMrTy90Aziw8br5c1u31cT9kPQb7OhYMd0nkyJFd6:fyCZX6TuA7OhYMgkWn6
Static task
static1
Behavioral task
behavioral1
Sample
dcf90e24387d8b337a07fc17c4060240f170c29a3c97ae74808406a0c3428d3c.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
dcf90e24387d8b337a07fc17c4060240f170c29a3c97ae74808406a0c3428d3c
-
Size
478KB
-
MD5
c29f217c0637db404b1aea7ad6302a27
-
SHA1
363c7a68e69a301a6c4f13910492276b5adf5100
-
SHA256
dcf90e24387d8b337a07fc17c4060240f170c29a3c97ae74808406a0c3428d3c
-
SHA512
a8f0a44f29b0f97621fbc3d14ef5b380ab349b313e79dcc90f0893c69a920babad5098ae3d87caae5dd9a6fb3b886e7e6b7956340ebbb79fdcbf3bfd685c5e78
-
SSDEEP
12288:UMrTy90Aziw8br5c1u31cT9kPQb7OhYMd0nkyJFd6:fyCZX6TuA7OhYMgkWn6
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1