General
-
Target
91435dfea819b62bab987ccf058cf6804c14730ec2d27412bc49ed45b38910aaN.exe
-
Size
610KB
-
Sample
241118-zxj6fazpem
-
MD5
ae300d4645c17a73212b28906bcce2e0
-
SHA1
b01ff1442a9b2954510305367b8fcbc94822fc55
-
SHA256
91435dfea819b62bab987ccf058cf6804c14730ec2d27412bc49ed45b38910aa
-
SHA512
36c51132486dfa30103cb966addd6890f8358a6d4b1d4f36ddd452cf2beb985a405c2d66057772ab886f27ab2e24394581346ad965205c94364e3ad6881724d4
-
SSDEEP
6144:5Vp0yN90QEc0ZB/90jQQAHqoM4z50z3OK2CAkn4HHPaVfbakb/ylkk1biDGV8gCJ:Gy90iexOcdL+zeGApn6fbZJgbiaRCJ
Static task
static1
Behavioral task
behavioral1
Sample
91435dfea819b62bab987ccf058cf6804c14730ec2d27412bc49ed45b38910aaN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
91435dfea819b62bab987ccf058cf6804c14730ec2d27412bc49ed45b38910aaN.exe
-
Size
610KB
-
MD5
ae300d4645c17a73212b28906bcce2e0
-
SHA1
b01ff1442a9b2954510305367b8fcbc94822fc55
-
SHA256
91435dfea819b62bab987ccf058cf6804c14730ec2d27412bc49ed45b38910aa
-
SHA512
36c51132486dfa30103cb966addd6890f8358a6d4b1d4f36ddd452cf2beb985a405c2d66057772ab886f27ab2e24394581346ad965205c94364e3ad6881724d4
-
SSDEEP
6144:5Vp0yN90QEc0ZB/90jQQAHqoM4z50z3OK2CAkn4HHPaVfbakb/ylkk1biDGV8gCJ:Gy90iexOcdL+zeGApn6fbZJgbiaRCJ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1