General
-
Target
6882ae8ca31412dab6e49fcbf028349f26711e3d8f4e9c171e4115b1c31e956fN.exe
-
Size
623KB
-
Sample
241119-aa131axeqf
-
MD5
b6c7d19630e091aae08ab1852d8ea960
-
SHA1
f97bd8cf75f6cb080c7e0faeb09d6c2df7f8dd05
-
SHA256
6882ae8ca31412dab6e49fcbf028349f26711e3d8f4e9c171e4115b1c31e956f
-
SHA512
b35addb848616b9c7959569b80f6a3db09e4062e902e807a8e343777795216d60a69144da5588452116e982bee9861c7b9a79c604758b8da0481788b0a60b8e7
-
SSDEEP
12288:/y90TtkhaDljgxTRv6BINmYaThiuBVI/p9xlSog0YqWCFxVMDZO:/ycuqlaTRy2wYadRY/tgDCRMDZO
Static task
static1
Behavioral task
behavioral1
Sample
6882ae8ca31412dab6e49fcbf028349f26711e3d8f4e9c171e4115b1c31e956fN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6882ae8ca31412dab6e49fcbf028349f26711e3d8f4e9c171e4115b1c31e956fN.exe
-
Size
623KB
-
MD5
b6c7d19630e091aae08ab1852d8ea960
-
SHA1
f97bd8cf75f6cb080c7e0faeb09d6c2df7f8dd05
-
SHA256
6882ae8ca31412dab6e49fcbf028349f26711e3d8f4e9c171e4115b1c31e956f
-
SHA512
b35addb848616b9c7959569b80f6a3db09e4062e902e807a8e343777795216d60a69144da5588452116e982bee9861c7b9a79c604758b8da0481788b0a60b8e7
-
SSDEEP
12288:/y90TtkhaDljgxTRv6BINmYaThiuBVI/p9xlSog0YqWCFxVMDZO:/ycuqlaTRy2wYadRY/tgDCRMDZO
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1