General
-
Target
73e355e95cdae53e36e9e9d4ebd186068e08eacbd66476caeccfc642aa95d9edN.exe
-
Size
613KB
-
Sample
241119-k9zdkataph
-
MD5
9f779448aa8421b5e5825db23db494e0
-
SHA1
ff33d59a74c30b3d11b32d8c3541dbf4f48064c2
-
SHA256
73e355e95cdae53e36e9e9d4ebd186068e08eacbd66476caeccfc642aa95d9ed
-
SHA512
e76d89ce49d01d36c11b1a789a31438d60bd589009beb9ab0305dbd25adfe78d0cc9784a6f999b5ff73e2b9a61425283a0faebc9aee3674c6dff88d908ceb1dc
-
SSDEEP
12288:4y90bw9s6UZcpuUpVMk28NQyqcbiDaBbn7WdohiulcE/p9xg1M:4ynBUkrpVNpKyyOBb7WdgRZ/CM
Static task
static1
Behavioral task
behavioral1
Sample
73e355e95cdae53e36e9e9d4ebd186068e08eacbd66476caeccfc642aa95d9edN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
73e355e95cdae53e36e9e9d4ebd186068e08eacbd66476caeccfc642aa95d9edN.exe
-
Size
613KB
-
MD5
9f779448aa8421b5e5825db23db494e0
-
SHA1
ff33d59a74c30b3d11b32d8c3541dbf4f48064c2
-
SHA256
73e355e95cdae53e36e9e9d4ebd186068e08eacbd66476caeccfc642aa95d9ed
-
SHA512
e76d89ce49d01d36c11b1a789a31438d60bd589009beb9ab0305dbd25adfe78d0cc9784a6f999b5ff73e2b9a61425283a0faebc9aee3674c6dff88d908ceb1dc
-
SSDEEP
12288:4y90bw9s6UZcpuUpVMk28NQyqcbiDaBbn7WdohiulcE/p9xg1M:4ynBUkrpVNpKyyOBb7WdgRZ/CM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1