General
-
Target
e6a191433a3586b9b0c39d23ac7a98ed71db28bbda1760ec464f6031ccb7599e.exe
-
Size
707KB
-
Sample
241118-pd9a4swdlb
-
MD5
b3a8383031b085902d177dca0bdaa60a
-
SHA1
5e80e9c4e49cea1c62f646bf5aab4d164762f643
-
SHA256
e6a191433a3586b9b0c39d23ac7a98ed71db28bbda1760ec464f6031ccb7599e
-
SHA512
0dae9b480e45006cc9230f988d8aff53ac0ad82169cc348e7721ca5f8ddf74b6562c0cd046fc7fc662591bfdf05f6801b0d2bbde6df16cc7c70737efb3518f83
-
SSDEEP
12288:ky90gh9KdPGOY3oJZWcPa4H7n4TZt5GZ51wD90czmAGJfCo6vI6njfJF:kyTXYJIZ4H7yZ7GZ518jzmAGJfCq6jfj
Static task
static1
Behavioral task
behavioral1
Sample
e6a191433a3586b9b0c39d23ac7a98ed71db28bbda1760ec464f6031ccb7599e.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e6a191433a3586b9b0c39d23ac7a98ed71db28bbda1760ec464f6031ccb7599e.exe
-
Size
707KB
-
MD5
b3a8383031b085902d177dca0bdaa60a
-
SHA1
5e80e9c4e49cea1c62f646bf5aab4d164762f643
-
SHA256
e6a191433a3586b9b0c39d23ac7a98ed71db28bbda1760ec464f6031ccb7599e
-
SHA512
0dae9b480e45006cc9230f988d8aff53ac0ad82169cc348e7721ca5f8ddf74b6562c0cd046fc7fc662591bfdf05f6801b0d2bbde6df16cc7c70737efb3518f83
-
SSDEEP
12288:ky90gh9KdPGOY3oJZWcPa4H7n4TZt5GZ51wD90czmAGJfCo6vI6njfJF:kyTXYJIZ4H7yZ7GZ518jzmAGJfCq6jfj
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1