General
-
Target
9e429c3bd96f67dd16931c4799a1d9aa607005fe0272b6e66055df48a548eea7
-
Size
308KB
-
Sample
241111-cs95qszlax
-
MD5
22e4af0d94fc7614776ae95c56cd9203
-
SHA1
2b7adc9b99da7a4309c9eb20503f9e87dac7daf9
-
SHA256
9e429c3bd96f67dd16931c4799a1d9aa607005fe0272b6e66055df48a548eea7
-
SHA512
4282c6d5d1f1b01069858d974495b9cd905d481fb9c53ec78f873eca9f67027ff8baa3588908ec0b7603971673c250b3ea7a0dd8dddec7cc4638d3a75290eb16
-
SSDEEP
6144:K0y+bnr+Np0yN90QEOlEY+zbPsq4JIR7wFvNl/fQGC:YMrBy90Mb+zZeTTl/G
Static task
static1
Behavioral task
behavioral1
Sample
9e429c3bd96f67dd16931c4799a1d9aa607005fe0272b6e66055df48a548eea7.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9e429c3bd96f67dd16931c4799a1d9aa607005fe0272b6e66055df48a548eea7
-
Size
308KB
-
MD5
22e4af0d94fc7614776ae95c56cd9203
-
SHA1
2b7adc9b99da7a4309c9eb20503f9e87dac7daf9
-
SHA256
9e429c3bd96f67dd16931c4799a1d9aa607005fe0272b6e66055df48a548eea7
-
SHA512
4282c6d5d1f1b01069858d974495b9cd905d481fb9c53ec78f873eca9f67027ff8baa3588908ec0b7603971673c250b3ea7a0dd8dddec7cc4638d3a75290eb16
-
SSDEEP
6144:K0y+bnr+Np0yN90QEOlEY+zbPsq4JIR7wFvNl/fQGC:YMrBy90Mb+zZeTTl/G
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1