General
-
Target
9cb507a06c958850002e23cd1c613672814c13063bc3a5d980612c4961e07863N.exe
-
Size
610KB
-
Sample
241118-nntsqsvqds
-
MD5
e3f2a77d80bfe9f579e0c0c241947e10
-
SHA1
0c8aea757f17c08e436f84c90eb9621c82890af1
-
SHA256
9cb507a06c958850002e23cd1c613672814c13063bc3a5d980612c4961e07863
-
SHA512
bef21beeac6681244291da2af40dab58de28e721dc02abba6c163f1bcb8ebe56f53510e424d8f539a7b3c9589f022b627a2348c0000040f8a7feb5588738bf93
-
SSDEEP
12288:Oy90frR2L8f94EGUlv1PYKPnPv6obZJgmXaR8LccM:Oyc+8WEGUx1Tf6WrgHaLccM
Static task
static1
Behavioral task
behavioral1
Sample
9cb507a06c958850002e23cd1c613672814c13063bc3a5d980612c4961e07863N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9cb507a06c958850002e23cd1c613672814c13063bc3a5d980612c4961e07863N.exe
-
Size
610KB
-
MD5
e3f2a77d80bfe9f579e0c0c241947e10
-
SHA1
0c8aea757f17c08e436f84c90eb9621c82890af1
-
SHA256
9cb507a06c958850002e23cd1c613672814c13063bc3a5d980612c4961e07863
-
SHA512
bef21beeac6681244291da2af40dab58de28e721dc02abba6c163f1bcb8ebe56f53510e424d8f539a7b3c9589f022b627a2348c0000040f8a7feb5588738bf93
-
SSDEEP
12288:Oy90frR2L8f94EGUlv1PYKPnPv6obZJgmXaR8LccM:Oyc+8WEGUx1Tf6WrgHaLccM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1