General
-
Target
39ce1c128a0cac71345ccebc8a519f08ffe4ca61ef1cdcf41c162a9562766ed5.exe
-
Size
470KB
-
Sample
241119-hlx5gs1ne1
-
MD5
750deaae91e0a128f0c4023dd1a8c754
-
SHA1
8d68148e4618a2b959d80dece49cb83d99eb7f27
-
SHA256
39ce1c128a0cac71345ccebc8a519f08ffe4ca61ef1cdcf41c162a9562766ed5
-
SHA512
0c09a838fd48191690e4a4a586ad37dd358122272d71e6967db4bf4099fb46695daca2515a9c555c29eed3a62c919d12fb6c1423e4a673d052bfc0312f4d73d1
-
SSDEEP
12288:1y90n5IQXsfZeT2mFhiu+Jc/p9xmGdn+ZK:1yCuQtz3RL/yK
Static task
static1
Behavioral task
behavioral1
Sample
39ce1c128a0cac71345ccebc8a519f08ffe4ca61ef1cdcf41c162a9562766ed5.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
39ce1c128a0cac71345ccebc8a519f08ffe4ca61ef1cdcf41c162a9562766ed5.exe
-
Size
470KB
-
MD5
750deaae91e0a128f0c4023dd1a8c754
-
SHA1
8d68148e4618a2b959d80dece49cb83d99eb7f27
-
SHA256
39ce1c128a0cac71345ccebc8a519f08ffe4ca61ef1cdcf41c162a9562766ed5
-
SHA512
0c09a838fd48191690e4a4a586ad37dd358122272d71e6967db4bf4099fb46695daca2515a9c555c29eed3a62c919d12fb6c1423e4a673d052bfc0312f4d73d1
-
SSDEEP
12288:1y90n5IQXsfZeT2mFhiu+Jc/p9xmGdn+ZK:1yCuQtz3RL/yK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1