General
-
Target
bcc3956e059d4923b1aaa258428100ee1158a96843193b6d6193cfb7ce202bd2N
-
Size
804KB
-
Sample
241111-c1xjlstpfn
-
MD5
1e28816d34eab2b9141b6ec8f2d842d0
-
SHA1
058da5f1eb7cb83894b805b9719ea131138f2539
-
SHA256
bcc3956e059d4923b1aaa258428100ee1158a96843193b6d6193cfb7ce202bd2
-
SHA512
73a33ab39cf40b2901ea75f4a0880252730d42a48595bfb09a97a0d19323164721b00d6b4c9d76f7b4fd86c2e44584b7424d4bdea37815d5dd6aa59aef666bd4
-
SSDEEP
12288:2y90Lh1Uzf697ZhoJWx0/HvBrfzWmkcJaM7Y9mMNMGW6cESaajgZYs:2yYh1Emh0/P9fztkYaM7EmMNMCfAgqs
Static task
static1
Behavioral task
behavioral1
Sample
bcc3956e059d4923b1aaa258428100ee1158a96843193b6d6193cfb7ce202bd2N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
bcc3956e059d4923b1aaa258428100ee1158a96843193b6d6193cfb7ce202bd2N
-
Size
804KB
-
MD5
1e28816d34eab2b9141b6ec8f2d842d0
-
SHA1
058da5f1eb7cb83894b805b9719ea131138f2539
-
SHA256
bcc3956e059d4923b1aaa258428100ee1158a96843193b6d6193cfb7ce202bd2
-
SHA512
73a33ab39cf40b2901ea75f4a0880252730d42a48595bfb09a97a0d19323164721b00d6b4c9d76f7b4fd86c2e44584b7424d4bdea37815d5dd6aa59aef666bd4
-
SSDEEP
12288:2y90Lh1Uzf697ZhoJWx0/HvBrfzWmkcJaM7Y9mMNMGW6cESaajgZYs:2yYh1Emh0/P9fztkYaM7EmMNMCfAgqs
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1