General
-
Target
b5bd8e06a45c95e4388fe859814322fe36946d654b2433402c3a0036205fa750N.exe
-
Size
469KB
-
Sample
241118-3c9r5ssnbk
-
MD5
0438d06c88065758284ad011ef08a020
-
SHA1
d51550a6e16dff0a392c87522ff8a6e0767818f8
-
SHA256
b5bd8e06a45c95e4388fe859814322fe36946d654b2433402c3a0036205fa750
-
SHA512
f6fd94a4bb0ff3cb17ee5e4879e33bdb8fd8b19630c75f3aff2eb27d16591041f4cd76119bfd603dafe9badba269d9793a3f01fc5ab9214414dfe6fd07dc22fc
-
SSDEEP
12288:zy90/5gFJhdkDcsDYjQkmyZ3KaM5SHxE++:zy25g92xkfZaBSRq
Static task
static1
Behavioral task
behavioral1
Sample
b5bd8e06a45c95e4388fe859814322fe36946d654b2433402c3a0036205fa750N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b5bd8e06a45c95e4388fe859814322fe36946d654b2433402c3a0036205fa750N.exe
-
Size
469KB
-
MD5
0438d06c88065758284ad011ef08a020
-
SHA1
d51550a6e16dff0a392c87522ff8a6e0767818f8
-
SHA256
b5bd8e06a45c95e4388fe859814322fe36946d654b2433402c3a0036205fa750
-
SHA512
f6fd94a4bb0ff3cb17ee5e4879e33bdb8fd8b19630c75f3aff2eb27d16591041f4cd76119bfd603dafe9badba269d9793a3f01fc5ab9214414dfe6fd07dc22fc
-
SSDEEP
12288:zy90/5gFJhdkDcsDYjQkmyZ3KaM5SHxE++:zy25g92xkfZaBSRq
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1