General
-
Target
38a6de4e985895513e72fef59680cebe216f0fed3d2a9fa03df34016a314126d.exe
-
Size
763KB
-
Sample
241119-emgmcavndr
-
MD5
fba2517d0f6737a21e78f7a5f939f924
-
SHA1
52f7182f1553c664d1e34352a752fada148b8b2f
-
SHA256
38a6de4e985895513e72fef59680cebe216f0fed3d2a9fa03df34016a314126d
-
SHA512
3d7cbe18fc6464e40ae1211b3bd928348fb1beae6134f599cd8394b9a76c6e7ae627dd2345e095346dc005d13fc80407e16f50f16785bb21ee566949bca1f83a
-
SSDEEP
12288:/y90etVz6OgWwpSWuWQWE9Iux6jX8SnW3iUHaj3Gc+IMpbDA3KSDqQqU9:/yHXkpSf3mX8SW3laTlMpAaA9
Static task
static1
Behavioral task
behavioral1
Sample
38a6de4e985895513e72fef59680cebe216f0fed3d2a9fa03df34016a314126d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
38a6de4e985895513e72fef59680cebe216f0fed3d2a9fa03df34016a314126d.exe
-
Size
763KB
-
MD5
fba2517d0f6737a21e78f7a5f939f924
-
SHA1
52f7182f1553c664d1e34352a752fada148b8b2f
-
SHA256
38a6de4e985895513e72fef59680cebe216f0fed3d2a9fa03df34016a314126d
-
SHA512
3d7cbe18fc6464e40ae1211b3bd928348fb1beae6134f599cd8394b9a76c6e7ae627dd2345e095346dc005d13fc80407e16f50f16785bb21ee566949bca1f83a
-
SSDEEP
12288:/y90etVz6OgWwpSWuWQWE9Iux6jX8SnW3iUHaj3Gc+IMpbDA3KSDqQqU9:/yHXkpSf3mX8SW3laTlMpAaA9
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1