General
-
Target
388e71c7ce31642491c59823962268d31b49f67d06e14cd785a4711bb8fad3f2N.exe
-
Size
612KB
-
Sample
241118-snv31sygrc
-
MD5
00240f49b6f6db5da05f6efc20381340
-
SHA1
d3c9a1a4931879b1b32314808b4f418c5be7f746
-
SHA256
388e71c7ce31642491c59823962268d31b49f67d06e14cd785a4711bb8fad3f2
-
SHA512
c2c3511e6919f76a14f6881ff2b68b6071ae0b984e629f0489c0c21d8c8b7a26cf70087bdd6e2f56cbf3266a26e52b7f624e0b84725d1415ea2f22b60cec6bc7
-
SSDEEP
12288:5y90pBHZGI0dX9iaJmleZ+SNdld7l3RHxcBbn7WtwhiulYE/p9xG5L:5yAZ2ttDtdR3RHxcBb7Wt4RV/6
Static task
static1
Behavioral task
behavioral1
Sample
388e71c7ce31642491c59823962268d31b49f67d06e14cd785a4711bb8fad3f2N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
388e71c7ce31642491c59823962268d31b49f67d06e14cd785a4711bb8fad3f2N.exe
-
Size
612KB
-
MD5
00240f49b6f6db5da05f6efc20381340
-
SHA1
d3c9a1a4931879b1b32314808b4f418c5be7f746
-
SHA256
388e71c7ce31642491c59823962268d31b49f67d06e14cd785a4711bb8fad3f2
-
SHA512
c2c3511e6919f76a14f6881ff2b68b6071ae0b984e629f0489c0c21d8c8b7a26cf70087bdd6e2f56cbf3266a26e52b7f624e0b84725d1415ea2f22b60cec6bc7
-
SSDEEP
12288:5y90pBHZGI0dX9iaJmleZ+SNdld7l3RHxcBbn7WtwhiulYE/p9xG5L:5yAZ2ttDtdR3RHxcBb7Wt4RV/6
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1