General
-
Target
e92c9763aebb7623b554c9822eb6d3b198e8496de2e68bd967e396ff85567f16.exe
-
Size
612KB
-
Sample
241118-waf9gs1paw
-
MD5
9c9bce046c482c7bb12e83bed84d630c
-
SHA1
f8a6d4f19c2ff2497ba73d0228cf35e18407b2e5
-
SHA256
e92c9763aebb7623b554c9822eb6d3b198e8496de2e68bd967e396ff85567f16
-
SHA512
664d6770e2637236a509751816f50655ffb9004d32a51bead38c8f057f379700166cc5d90402e099c44a7fe7007bfdc17817bf15effe755b7ce0f10b83cd3280
-
SSDEEP
12288:5y90pBHZGI0dX9iaJmleZ+SNdld7l3RHxcBbn7WtwhiulYE/p9xG5LC:5yAZ2ttDtdR3RHxcBb7Wt4RV/6C
Static task
static1
Behavioral task
behavioral1
Sample
e92c9763aebb7623b554c9822eb6d3b198e8496de2e68bd967e396ff85567f16.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e92c9763aebb7623b554c9822eb6d3b198e8496de2e68bd967e396ff85567f16.exe
-
Size
612KB
-
MD5
9c9bce046c482c7bb12e83bed84d630c
-
SHA1
f8a6d4f19c2ff2497ba73d0228cf35e18407b2e5
-
SHA256
e92c9763aebb7623b554c9822eb6d3b198e8496de2e68bd967e396ff85567f16
-
SHA512
664d6770e2637236a509751816f50655ffb9004d32a51bead38c8f057f379700166cc5d90402e099c44a7fe7007bfdc17817bf15effe755b7ce0f10b83cd3280
-
SSDEEP
12288:5y90pBHZGI0dX9iaJmleZ+SNdld7l3RHxcBbn7WtwhiulYE/p9xG5LC:5yAZ2ttDtdR3RHxcBb7Wt4RV/6C
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1