General
-
Target
333d7fd0817ebb298968e84cf030057b30f334506a5f8029b7aa5542b94946ef
-
Size
1.5MB
-
Sample
241111-cd9knazgrb
-
MD5
7d20f63f98e4f771c6f3dc08b41654a3
-
SHA1
b3be7b245cd29c75fd25619bd78fbfaff7e88fa9
-
SHA256
333d7fd0817ebb298968e84cf030057b30f334506a5f8029b7aa5542b94946ef
-
SHA512
e7bfb4c0eedfd8a5e0f6283de0eb9b2c3eb8a5aaed6ec5dbbc85971ec916c5ee7f4270d9983e18a1028a9d4bbb322f402de21c25add95f0eea040437ce080a20
-
SSDEEP
49152:qr9k1dpGGqDLxd1vBbnGW7qfAKoCjoCUC:a9EY/nDYfAK9o7
Static task
static1
Behavioral task
behavioral1
Sample
333d7fd0817ebb298968e84cf030057b30f334506a5f8029b7aa5542b94946ef.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
333d7fd0817ebb298968e84cf030057b30f334506a5f8029b7aa5542b94946ef
-
Size
1.5MB
-
MD5
7d20f63f98e4f771c6f3dc08b41654a3
-
SHA1
b3be7b245cd29c75fd25619bd78fbfaff7e88fa9
-
SHA256
333d7fd0817ebb298968e84cf030057b30f334506a5f8029b7aa5542b94946ef
-
SHA512
e7bfb4c0eedfd8a5e0f6283de0eb9b2c3eb8a5aaed6ec5dbbc85971ec916c5ee7f4270d9983e18a1028a9d4bbb322f402de21c25add95f0eea040437ce080a20
-
SSDEEP
49152:qr9k1dpGGqDLxd1vBbnGW7qfAKoCjoCUC:a9EY/nDYfAK9o7
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1