General
-
Target
39854ea084a8d6da32d90c00400747b2c818f6fc6bea4d22c95ad1ac2df7b021
-
Size
1.0MB
-
Sample
241111-cltt6szjfz
-
MD5
364b26720857c29e92a8aa4fb582c2cc
-
SHA1
16d6be9682dbae568c7fa1c84a7464ed413c8363
-
SHA256
39854ea084a8d6da32d90c00400747b2c818f6fc6bea4d22c95ad1ac2df7b021
-
SHA512
3fa6446ae8b69c7ae6267b8ff80d998367de7a0a4d7336c93e9034b71ef3927b1851362ac2d1adc591d4ccdeacf197ebfad5c8669ad52ac5a55854eadd1e8b09
-
SSDEEP
24576:vyyepWw6CZCOIin9phJ0z9TBKRaoMfQpTf0U+:6XWw64Qi9OD74pj
Static task
static1
Behavioral task
behavioral1
Sample
39854ea084a8d6da32d90c00400747b2c818f6fc6bea4d22c95ad1ac2df7b021.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
39854ea084a8d6da32d90c00400747b2c818f6fc6bea4d22c95ad1ac2df7b021
-
Size
1.0MB
-
MD5
364b26720857c29e92a8aa4fb582c2cc
-
SHA1
16d6be9682dbae568c7fa1c84a7464ed413c8363
-
SHA256
39854ea084a8d6da32d90c00400747b2c818f6fc6bea4d22c95ad1ac2df7b021
-
SHA512
3fa6446ae8b69c7ae6267b8ff80d998367de7a0a4d7336c93e9034b71ef3927b1851362ac2d1adc591d4ccdeacf197ebfad5c8669ad52ac5a55854eadd1e8b09
-
SSDEEP
24576:vyyepWw6CZCOIin9phJ0z9TBKRaoMfQpTf0U+:6XWw64Qi9OD74pj
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1