General
-
Target
bb8ec435b0035f17fb336e2d3bc0fddc3c59b009b123e60d934c3b991b3b1f46
-
Size
414KB
-
Sample
241111-c8nlnstrgk
-
MD5
8e688b1906d6d7787c2bfb070e71fa26
-
SHA1
918d7349ef89d496337ddb94d7e7e469d0d51730
-
SHA256
bb8ec435b0035f17fb336e2d3bc0fddc3c59b009b123e60d934c3b991b3b1f46
-
SHA512
fc4d254e1f396b089fdf999617b038567ef90d20f95a8c25ce45da1c85590222c6388c0df7e9b00b79cf8d18f52ab115543be2ccedd91cffb89cbb58ecf54d09
-
SSDEEP
6144:lOp0yN90QEzdGyaUnk6NR8b+IHfcJJnyCnERs7ir2WMGJpzUgL6aMnE:9y90RYnOk6JIHQJnyCn07ZJpzUE6m
Static task
static1
Behavioral task
behavioral1
Sample
bb8ec435b0035f17fb336e2d3bc0fddc3c59b009b123e60d934c3b991b3b1f46.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
bb8ec435b0035f17fb336e2d3bc0fddc3c59b009b123e60d934c3b991b3b1f46
-
Size
414KB
-
MD5
8e688b1906d6d7787c2bfb070e71fa26
-
SHA1
918d7349ef89d496337ddb94d7e7e469d0d51730
-
SHA256
bb8ec435b0035f17fb336e2d3bc0fddc3c59b009b123e60d934c3b991b3b1f46
-
SHA512
fc4d254e1f396b089fdf999617b038567ef90d20f95a8c25ce45da1c85590222c6388c0df7e9b00b79cf8d18f52ab115543be2ccedd91cffb89cbb58ecf54d09
-
SSDEEP
6144:lOp0yN90QEzdGyaUnk6NR8b+IHfcJJnyCnERs7ir2WMGJpzUgL6aMnE:9y90RYnOk6JIHQJnyCn07ZJpzUE6m
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1