General
-
Target
a154ae9ed8d419e3ccb08c61ebe20c3c76151e06e8c309ab96eb49e0af2a2c73N.exe
-
Size
806KB
-
Sample
241118-s3zdzszjaw
-
MD5
273407a5cfe6376c69d52a3c6aa34d10
-
SHA1
5943962ddc15f981a8faccb1b3cffeba353e7684
-
SHA256
a154ae9ed8d419e3ccb08c61ebe20c3c76151e06e8c309ab96eb49e0af2a2c73
-
SHA512
c251830f994f07d1af01bf862308f641cd81c1dece02a36086e49d444916f29c47f0e3a6b5d9942e2729affba9e94fee7a7f7b7133d7daa4da91f56a13415265
-
SSDEEP
12288:uy90AEiGi8Q3x1Z5mZmnhiub5h/p9xflHWBoKCQsooIn3G:uynElGhgQR3/pl2BoBI2
Static task
static1
Behavioral task
behavioral1
Sample
a154ae9ed8d419e3ccb08c61ebe20c3c76151e06e8c309ab96eb49e0af2a2c73N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
a154ae9ed8d419e3ccb08c61ebe20c3c76151e06e8c309ab96eb49e0af2a2c73N.exe
-
Size
806KB
-
MD5
273407a5cfe6376c69d52a3c6aa34d10
-
SHA1
5943962ddc15f981a8faccb1b3cffeba353e7684
-
SHA256
a154ae9ed8d419e3ccb08c61ebe20c3c76151e06e8c309ab96eb49e0af2a2c73
-
SHA512
c251830f994f07d1af01bf862308f641cd81c1dece02a36086e49d444916f29c47f0e3a6b5d9942e2729affba9e94fee7a7f7b7133d7daa4da91f56a13415265
-
SSDEEP
12288:uy90AEiGi8Q3x1Z5mZmnhiub5h/p9xflHWBoKCQsooIn3G:uynElGhgQR3/pl2BoBI2
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1