General
-
Target
998a25dd6724a5b4ea2c3c2804873d7634016fe10d29b11d8dec6d35fbc64630
-
Size
674KB
-
Sample
241111-c39xqaznbz
-
MD5
3fca2d400ed4cd975bd1bbfce9a89bda
-
SHA1
3af7d1e17b0d5446bcbddfe4599150dcd526c8db
-
SHA256
998a25dd6724a5b4ea2c3c2804873d7634016fe10d29b11d8dec6d35fbc64630
-
SHA512
ca67aa71b432f9ec45f5eb358ad2102cf06aa9b0c203d7d357fdd805ecc4041c1f579451e2b7326e1d0f628839cb11c3fab571557f9b7bb4608da19a1aa063d0
-
SSDEEP
12288:jy909WOhqySrqf0qPs0W0Pcvh2gvUrxJkkvwDIShPxWHP2p5r9hlZCt:jyjOhqySBqPEKcvQkWTvwVhPxSuxzwt
Static task
static1
Behavioral task
behavioral1
Sample
998a25dd6724a5b4ea2c3c2804873d7634016fe10d29b11d8dec6d35fbc64630.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
998a25dd6724a5b4ea2c3c2804873d7634016fe10d29b11d8dec6d35fbc64630
-
Size
674KB
-
MD5
3fca2d400ed4cd975bd1bbfce9a89bda
-
SHA1
3af7d1e17b0d5446bcbddfe4599150dcd526c8db
-
SHA256
998a25dd6724a5b4ea2c3c2804873d7634016fe10d29b11d8dec6d35fbc64630
-
SHA512
ca67aa71b432f9ec45f5eb358ad2102cf06aa9b0c203d7d357fdd805ecc4041c1f579451e2b7326e1d0f628839cb11c3fab571557f9b7bb4608da19a1aa063d0
-
SSDEEP
12288:jy909WOhqySrqf0qPs0W0Pcvh2gvUrxJkkvwDIShPxWHP2p5r9hlZCt:jyjOhqySBqPEKcvQkWTvwVhPxSuxzwt
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1