General
-
Target
3b90b664b1ac739d32cbfea38ee16febe243445d008f509565cea3a95234b652.exe
-
Size
471KB
-
Sample
241119-hm1l1asdkm
-
MD5
3002e7e12eeb1042e6dd6cd1a86bcaec
-
SHA1
6e95dcda1e5331416e7240d9f6d93e0d7fab3f17
-
SHA256
3b90b664b1ac739d32cbfea38ee16febe243445d008f509565cea3a95234b652
-
SHA512
c80f33744dbafad1f3091ab87115ab5c1ecdc6e6b8497927da20c7bc5d056f5db5cc1ca4d74049257b2278dfbd9b1cb11ff024a744bb036a1185ccaceebe7f8c
-
SSDEEP
6144:Pkp0yN90QECKPd3hxOYfn6+YPD7aDN/+YIbaQbaywkk1788GVd6+Qe6MPVBAkPFG:ty90a6n6tXaDJIbRVg78RC+Qe6qP7PFG
Static task
static1
Behavioral task
behavioral1
Sample
3b90b664b1ac739d32cbfea38ee16febe243445d008f509565cea3a95234b652.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
3b90b664b1ac739d32cbfea38ee16febe243445d008f509565cea3a95234b652.exe
-
Size
471KB
-
MD5
3002e7e12eeb1042e6dd6cd1a86bcaec
-
SHA1
6e95dcda1e5331416e7240d9f6d93e0d7fab3f17
-
SHA256
3b90b664b1ac739d32cbfea38ee16febe243445d008f509565cea3a95234b652
-
SHA512
c80f33744dbafad1f3091ab87115ab5c1ecdc6e6b8497927da20c7bc5d056f5db5cc1ca4d74049257b2278dfbd9b1cb11ff024a744bb036a1185ccaceebe7f8c
-
SSDEEP
6144:Pkp0yN90QECKPd3hxOYfn6+YPD7aDN/+YIbaQbaywkk1788GVd6+Qe6MPVBAkPFG:ty90a6n6tXaDJIbRVg78RC+Qe6qP7PFG
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1