General
-
Target
6ec121d0d1f0c8a727c47028d52ba809c6b3ee635f26f055561097d36e09c53f.exe
-
Size
610KB
-
Sample
241119-cl9wdszdlk
-
MD5
661b93a0d1686d5c8ee8f3a7a31660de
-
SHA1
33f4b792c28b97db11e8815fc7751110530d8d22
-
SHA256
6ec121d0d1f0c8a727c47028d52ba809c6b3ee635f26f055561097d36e09c53f
-
SHA512
0cbb5453af4db814388598ae61aed7b7c5820b1838cd662afc1ee884ddcf89a8c513f985207f5b1f389bdf0391e50b2a34c2143656f1624ef294fd58ca08f5c3
-
SSDEEP
12288:Vy909GwMUUy5FvIRywsMFJY1Ofc+WrisbZJgEHaRMyk:VyYG+bzAEwJFSprXrgvKyk
Static task
static1
Behavioral task
behavioral1
Sample
6ec121d0d1f0c8a727c47028d52ba809c6b3ee635f26f055561097d36e09c53f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6ec121d0d1f0c8a727c47028d52ba809c6b3ee635f26f055561097d36e09c53f.exe
-
Size
610KB
-
MD5
661b93a0d1686d5c8ee8f3a7a31660de
-
SHA1
33f4b792c28b97db11e8815fc7751110530d8d22
-
SHA256
6ec121d0d1f0c8a727c47028d52ba809c6b3ee635f26f055561097d36e09c53f
-
SHA512
0cbb5453af4db814388598ae61aed7b7c5820b1838cd662afc1ee884ddcf89a8c513f985207f5b1f389bdf0391e50b2a34c2143656f1624ef294fd58ca08f5c3
-
SSDEEP
12288:Vy909GwMUUy5FvIRywsMFJY1Ofc+WrisbZJgEHaRMyk:VyYG+bzAEwJFSprXrgvKyk
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1