General
-
Target
f309f3124c3f9c1a8a73b06413b5d8a849026096709dd5ef1ac894cccc05e4c3N.exe
-
Size
568KB
-
Sample
241118-l4z9catpdx
-
MD5
c1e00e230e2cfa778c59c9cdf12419d0
-
SHA1
f6a9181eeba6acdc3dd2692801ad8187e064543b
-
SHA256
f309f3124c3f9c1a8a73b06413b5d8a849026096709dd5ef1ac894cccc05e4c3
-
SHA512
a23b7362d0d864fcb6a7983db396fa10087647f771cab03f3fcd6ba6e17b6dc77136a87fc3fdc62dea04c2ebebb4200afbc43538797cfe99589250b44be739ef
-
SSDEEP
12288:1y90bxCpGQ6/E/TMT7/IwGxGH9zbPVJnAo/:1yaU/sOTq7XRAa
Static task
static1
Behavioral task
behavioral1
Sample
f309f3124c3f9c1a8a73b06413b5d8a849026096709dd5ef1ac894cccc05e4c3N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f309f3124c3f9c1a8a73b06413b5d8a849026096709dd5ef1ac894cccc05e4c3N.exe
-
Size
568KB
-
MD5
c1e00e230e2cfa778c59c9cdf12419d0
-
SHA1
f6a9181eeba6acdc3dd2692801ad8187e064543b
-
SHA256
f309f3124c3f9c1a8a73b06413b5d8a849026096709dd5ef1ac894cccc05e4c3
-
SHA512
a23b7362d0d864fcb6a7983db396fa10087647f771cab03f3fcd6ba6e17b6dc77136a87fc3fdc62dea04c2ebebb4200afbc43538797cfe99589250b44be739ef
-
SSDEEP
12288:1y90bxCpGQ6/E/TMT7/IwGxGH9zbPVJnAo/:1yaU/sOTq7XRAa
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1