General
-
Target
b1db9339444d2f8ad8c2ee1493a9441cb4a5d2ae396ad325d6ca37a2d3758d6b
-
Size
560KB
-
Sample
241111-cff15azhjg
-
MD5
68e739a46b8e4ea46d4669c8402a9734
-
SHA1
4462884ac254d48efdc3b0ddca622e77bbe02c24
-
SHA256
b1db9339444d2f8ad8c2ee1493a9441cb4a5d2ae396ad325d6ca37a2d3758d6b
-
SHA512
47be4096bb3616e9044b02c1949ce54f9073f87cecd3290a34e4d0eb05642c4ea87c631ffa95dee7ee03af35ea19fb4c0d988ffdc1d9e5546befb36cf14aea93
-
SSDEEP
12288:cy90DQryGqeX2jEx8OX+d/ylwGraLUdjXW39WC:cynqg2jEx86+dKltraE63D
Static task
static1
Behavioral task
behavioral1
Sample
b1db9339444d2f8ad8c2ee1493a9441cb4a5d2ae396ad325d6ca37a2d3758d6b.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b1db9339444d2f8ad8c2ee1493a9441cb4a5d2ae396ad325d6ca37a2d3758d6b
-
Size
560KB
-
MD5
68e739a46b8e4ea46d4669c8402a9734
-
SHA1
4462884ac254d48efdc3b0ddca622e77bbe02c24
-
SHA256
b1db9339444d2f8ad8c2ee1493a9441cb4a5d2ae396ad325d6ca37a2d3758d6b
-
SHA512
47be4096bb3616e9044b02c1949ce54f9073f87cecd3290a34e4d0eb05642c4ea87c631ffa95dee7ee03af35ea19fb4c0d988ffdc1d9e5546befb36cf14aea93
-
SSDEEP
12288:cy90DQryGqeX2jEx8OX+d/ylwGraLUdjXW39WC:cynqg2jEx86+dKltraE63D
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1