General
-
Target
692f43248156b86e730037da2a187fef81656d3e607b943ef128443cc7c1619dN.exe
-
Size
470KB
-
Sample
241119-ewx1pazekd
-
MD5
9c2260dab1db93bb46138f00051f7e30
-
SHA1
01863bf815e763909b61b3e1e6535fda1cc06dc6
-
SHA256
692f43248156b86e730037da2a187fef81656d3e607b943ef128443cc7c1619d
-
SHA512
20e13e4973499be89925c52e5baf65a8e3d2c0c4ca28be6f15a4ebdce05e1c337ce07e4439a14c324c71bdf2f679ee338c2d7c55cfd2761488c735196e6b9716
-
SSDEEP
12288:my90MRMLqeUzEEqZWQOATagO5B+XmErSng8bEo9Zu:myeuwIwRmErSg8gx
Static task
static1
Behavioral task
behavioral1
Sample
692f43248156b86e730037da2a187fef81656d3e607b943ef128443cc7c1619dN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
692f43248156b86e730037da2a187fef81656d3e607b943ef128443cc7c1619dN.exe
-
Size
470KB
-
MD5
9c2260dab1db93bb46138f00051f7e30
-
SHA1
01863bf815e763909b61b3e1e6535fda1cc06dc6
-
SHA256
692f43248156b86e730037da2a187fef81656d3e607b943ef128443cc7c1619d
-
SHA512
20e13e4973499be89925c52e5baf65a8e3d2c0c4ca28be6f15a4ebdce05e1c337ce07e4439a14c324c71bdf2f679ee338c2d7c55cfd2761488c735196e6b9716
-
SSDEEP
12288:my90MRMLqeUzEEqZWQOATagO5B+XmErSng8bEo9Zu:myeuwIwRmErSg8gx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1