General
-
Target
3c9b1444e1ab901bb4280a6e8ddb41bd80b5f8ffdb41207c9cc5a5cc738c5731N.exe
-
Size
414KB
-
Sample
241118-y7tbesvjbz
-
MD5
e4d47cf9eb343e3608237d00fad35a60
-
SHA1
9bc66d1030e927a99612fc3d28b92f7a6fe5e0ea
-
SHA256
3c9b1444e1ab901bb4280a6e8ddb41bd80b5f8ffdb41207c9cc5a5cc738c5731
-
SHA512
32ea63003ad20f00ff56b506eb3672e816df0c378651f9449d4bf01a5805b5be210bcb3955122dc6a96d8bf38fa0b4c3650e8d93562bc02ba2342ac82947ab15
-
SSDEEP
6144:scp0yN90QEVmA87YVDbfC0bDZQqF1VhoO/SFJeZBmJWUyNe/AQV9wK3GtyGW6Hmk:Wy90/mA8yzpTFYivowKWtyN6Hr
Static task
static1
Behavioral task
behavioral1
Sample
3c9b1444e1ab901bb4280a6e8ddb41bd80b5f8ffdb41207c9cc5a5cc738c5731N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
3c9b1444e1ab901bb4280a6e8ddb41bd80b5f8ffdb41207c9cc5a5cc738c5731N.exe
-
Size
414KB
-
MD5
e4d47cf9eb343e3608237d00fad35a60
-
SHA1
9bc66d1030e927a99612fc3d28b92f7a6fe5e0ea
-
SHA256
3c9b1444e1ab901bb4280a6e8ddb41bd80b5f8ffdb41207c9cc5a5cc738c5731
-
SHA512
32ea63003ad20f00ff56b506eb3672e816df0c378651f9449d4bf01a5805b5be210bcb3955122dc6a96d8bf38fa0b4c3650e8d93562bc02ba2342ac82947ab15
-
SSDEEP
6144:scp0yN90QEVmA87YVDbfC0bDZQqF1VhoO/SFJeZBmJWUyNe/AQV9wK3GtyGW6Hmk:Wy90/mA8yzpTFYivowKWtyN6Hr
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1