General
-
Target
f9c5caf18d86cc1696e3c308236b0ee4e13ed19343517d41c0d78142229fc450
-
Size
747KB
-
Sample
241111-brplzazcqg
-
MD5
bb1d4bb66b7028ad95651ee357549eaa
-
SHA1
465325f97382d984c201665f2d758b85197e0b14
-
SHA256
f9c5caf18d86cc1696e3c308236b0ee4e13ed19343517d41c0d78142229fc450
-
SHA512
dca547b44a54d03e28e32f8a705ecec184a5917dbbcf61930ea0083f5d5b006de944c0cde9aa977da329b84c4a12ce28e9726c6057476a5f4a4739aef74c8d25
-
SSDEEP
12288:Sy9073buZ2r1RwXtDcKbzptURVg6weeEzwMjzJlz4JNPtRvFpdSlqATQ:SyOr1acyzvhZe/HHaNPDvFPSkATQ
Static task
static1
Behavioral task
behavioral1
Sample
f9c5caf18d86cc1696e3c308236b0ee4e13ed19343517d41c0d78142229fc450.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f9c5caf18d86cc1696e3c308236b0ee4e13ed19343517d41c0d78142229fc450
-
Size
747KB
-
MD5
bb1d4bb66b7028ad95651ee357549eaa
-
SHA1
465325f97382d984c201665f2d758b85197e0b14
-
SHA256
f9c5caf18d86cc1696e3c308236b0ee4e13ed19343517d41c0d78142229fc450
-
SHA512
dca547b44a54d03e28e32f8a705ecec184a5917dbbcf61930ea0083f5d5b006de944c0cde9aa977da329b84c4a12ce28e9726c6057476a5f4a4739aef74c8d25
-
SSDEEP
12288:Sy9073buZ2r1RwXtDcKbzptURVg6weeEzwMjzJlz4JNPtRvFpdSlqATQ:SyOr1acyzvhZe/HHaNPDvFPSkATQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1