General
-
Target
e47b7e706e433f6f97b9c4c1bd261530e1c1a485aba809c748c77a1b3bbb8b17.exe
-
Size
766KB
-
Sample
241118-xgjtmasncv
-
MD5
88459ce60ede9fe8645e1ce78b5f8347
-
SHA1
e17e221a30fe42b94915c74780bf2ecfcca04ff6
-
SHA256
e47b7e706e433f6f97b9c4c1bd261530e1c1a485aba809c748c77a1b3bbb8b17
-
SHA512
ce028fb8aa934284a7cce313dcbe393e0cfda0932ea29888708cb81133b2fd0c71b52821fccd1ce8ca6e5c6366ee53ae025677dd84f995324f4dd60698e4301a
-
SSDEEP
12288:dy90vMpqFS/w7Fa/+PB3hzkpCV34Rnn9WG1hiu0zE/prxAko4mO:dywMpqFS/wZe+Z31tsn9WGHRz/IO
Static task
static1
Behavioral task
behavioral1
Sample
e47b7e706e433f6f97b9c4c1bd261530e1c1a485aba809c748c77a1b3bbb8b17.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e47b7e706e433f6f97b9c4c1bd261530e1c1a485aba809c748c77a1b3bbb8b17.exe
-
Size
766KB
-
MD5
88459ce60ede9fe8645e1ce78b5f8347
-
SHA1
e17e221a30fe42b94915c74780bf2ecfcca04ff6
-
SHA256
e47b7e706e433f6f97b9c4c1bd261530e1c1a485aba809c748c77a1b3bbb8b17
-
SHA512
ce028fb8aa934284a7cce313dcbe393e0cfda0932ea29888708cb81133b2fd0c71b52821fccd1ce8ca6e5c6366ee53ae025677dd84f995324f4dd60698e4301a
-
SSDEEP
12288:dy90vMpqFS/w7Fa/+PB3hzkpCV34Rnn9WG1hiu0zE/prxAko4mO:dywMpqFS/wZe+Z31tsn9WGHRz/IO
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1