General
-
Target
5fb543090ef9f35755eb46f0a7ef6086cc4d6f9a6664462255272d8c0c1e5b2bN.exe
-
Size
989KB
-
Sample
241118-mj3dmsvarh
-
MD5
b1fc96a847e1d1e7537609c37fbba240
-
SHA1
d55da593a5ff24ed4710b47f906233f75bab2dee
-
SHA256
5fb543090ef9f35755eb46f0a7ef6086cc4d6f9a6664462255272d8c0c1e5b2b
-
SHA512
49ed7a5206ac62727c09fc9b58aad82e7438143f0ba7c81d6fe7b3b271cf9155e9c2f34f409ccea0be8f08d6d608ab17cd339a6a541d4aed4e76ed05971403bd
-
SSDEEP
24576:2yKSRwuwJTL71eEN5nTnG94oWK+J9/Vbr/:FULTL71lnTGyoql
Static task
static1
Behavioral task
behavioral1
Sample
5fb543090ef9f35755eb46f0a7ef6086cc4d6f9a6664462255272d8c0c1e5b2bN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5fb543090ef9f35755eb46f0a7ef6086cc4d6f9a6664462255272d8c0c1e5b2bN.exe
-
Size
989KB
-
MD5
b1fc96a847e1d1e7537609c37fbba240
-
SHA1
d55da593a5ff24ed4710b47f906233f75bab2dee
-
SHA256
5fb543090ef9f35755eb46f0a7ef6086cc4d6f9a6664462255272d8c0c1e5b2b
-
SHA512
49ed7a5206ac62727c09fc9b58aad82e7438143f0ba7c81d6fe7b3b271cf9155e9c2f34f409ccea0be8f08d6d608ab17cd339a6a541d4aed4e76ed05971403bd
-
SSDEEP
24576:2yKSRwuwJTL71eEN5nTnG94oWK+J9/Vbr/:FULTL71lnTGyoql
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1