General
-
Target
79b4d8e7f6b91f0d48fd3750482aafba221041fe7973d63ad6c39f13858eef41.exe
-
Size
469KB
-
Sample
241119-cn9neatqbr
-
MD5
89a05a125610f3357a505c1e8603ae34
-
SHA1
88bea24a17e919c8f3733b9feb141155c04354ba
-
SHA256
79b4d8e7f6b91f0d48fd3750482aafba221041fe7973d63ad6c39f13858eef41
-
SHA512
0d2caabc02c5d4caaf129445e8ac4e5d21c3ebd52f26d8da85ebdb75e647d7cadaaa446a2c71e9b6d8d33b759a0b18c10c3d23c0e67e32303fc1b4dc86165959
-
SSDEEP
6144:HEp0yN90QEC/ayCT5gQXNFmWffk+a8+U34y5hJwAI0sktR0uFHi6VHcwgxbtQjiP:Fy90aSVgQ/nffba2bJJTTF1Cb2uP
Static task
static1
Behavioral task
behavioral1
Sample
79b4d8e7f6b91f0d48fd3750482aafba221041fe7973d63ad6c39f13858eef41.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
79b4d8e7f6b91f0d48fd3750482aafba221041fe7973d63ad6c39f13858eef41.exe
-
Size
469KB
-
MD5
89a05a125610f3357a505c1e8603ae34
-
SHA1
88bea24a17e919c8f3733b9feb141155c04354ba
-
SHA256
79b4d8e7f6b91f0d48fd3750482aafba221041fe7973d63ad6c39f13858eef41
-
SHA512
0d2caabc02c5d4caaf129445e8ac4e5d21c3ebd52f26d8da85ebdb75e647d7cadaaa446a2c71e9b6d8d33b759a0b18c10c3d23c0e67e32303fc1b4dc86165959
-
SSDEEP
6144:HEp0yN90QEC/ayCT5gQXNFmWffk+a8+U34y5hJwAI0sktR0uFHi6VHcwgxbtQjiP:Fy90aSVgQ/nffba2bJJTTF1Cb2uP
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1