General
-
Target
be3ecb911577dd71b08d6246fedeef3e023e4fb01a7b39a1edf8370e48d03c1f.exe
-
Size
469KB
-
Sample
241119-azw6cayfmn
-
MD5
0ee679c1dcfcfb22b4e2f6edea62d529
-
SHA1
ba0ebf1bd38c66d700f9531501b128f064a40bb0
-
SHA256
be3ecb911577dd71b08d6246fedeef3e023e4fb01a7b39a1edf8370e48d03c1f
-
SHA512
169382ab5237d92da847d245237ed4d94ed2047e4c60ce6b4299c4fba27ba401f5a69cccc0f9419a50f09065471fc529987996f786007b3cddf40b3141eb9769
-
SSDEEP
6144:ZTp0yN90QEUWYoXzTlOCiTSf7B0MSH3tURf/XtE8bMZKIlgziEeBw7aJIVByvv0:Qy90yoXzTlO2I63KnZDgOPiaJeA0
Static task
static1
Behavioral task
behavioral1
Sample
be3ecb911577dd71b08d6246fedeef3e023e4fb01a7b39a1edf8370e48d03c1f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
be3ecb911577dd71b08d6246fedeef3e023e4fb01a7b39a1edf8370e48d03c1f.exe
-
Size
469KB
-
MD5
0ee679c1dcfcfb22b4e2f6edea62d529
-
SHA1
ba0ebf1bd38c66d700f9531501b128f064a40bb0
-
SHA256
be3ecb911577dd71b08d6246fedeef3e023e4fb01a7b39a1edf8370e48d03c1f
-
SHA512
169382ab5237d92da847d245237ed4d94ed2047e4c60ce6b4299c4fba27ba401f5a69cccc0f9419a50f09065471fc529987996f786007b3cddf40b3141eb9769
-
SSDEEP
6144:ZTp0yN90QEUWYoXzTlOCiTSf7B0MSH3tURf/XtE8bMZKIlgziEeBw7aJIVByvv0:Qy90yoXzTlO2I63KnZDgOPiaJeA0
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1