General
-
Target
536ddcea0739f743f5913488616ef41b7a5a07a71c9ff9aefdbec402746d97d2.exe
-
Size
707KB
-
Sample
241119-emwq9svnek
-
MD5
21207de7570adeac629b9f921445dd14
-
SHA1
8e71ac537c634150a1446af988bbab27bc2b75fd
-
SHA256
536ddcea0739f743f5913488616ef41b7a5a07a71c9ff9aefdbec402746d97d2
-
SHA512
9b46883dbbdef7df7ea5ad40e39edb7d41bd382d40f7237bca97eeac33e626d7e5e5a522d8e0d0a7b50afb76bc0ff9cd0d5a3af711170b6d0f6d5ddfa7d8c5bd
-
SSDEEP
12288:dy90Ilg96a4uS6e6XI/jqmJ9xHXttFncI9ANeLgFJHeaaOh4:dyVlg96zb64fJ9R1nzANT2aaOh4
Static task
static1
Behavioral task
behavioral1
Sample
536ddcea0739f743f5913488616ef41b7a5a07a71c9ff9aefdbec402746d97d2.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
536ddcea0739f743f5913488616ef41b7a5a07a71c9ff9aefdbec402746d97d2.exe
-
Size
707KB
-
MD5
21207de7570adeac629b9f921445dd14
-
SHA1
8e71ac537c634150a1446af988bbab27bc2b75fd
-
SHA256
536ddcea0739f743f5913488616ef41b7a5a07a71c9ff9aefdbec402746d97d2
-
SHA512
9b46883dbbdef7df7ea5ad40e39edb7d41bd382d40f7237bca97eeac33e626d7e5e5a522d8e0d0a7b50afb76bc0ff9cd0d5a3af711170b6d0f6d5ddfa7d8c5bd
-
SSDEEP
12288:dy90Ilg96a4uS6e6XI/jqmJ9xHXttFncI9ANeLgFJHeaaOh4:dyVlg96zb64fJ9R1nzANT2aaOh4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1