General
-
Target
b99acd2fc2bf1092ca17c153979656ab83c5958fc26b75d1d340534fd4474068N.exe
-
Size
624KB
-
Sample
241119-khb4ysxnfq
-
MD5
72dcd16e54e21ee8dd22323f4a843040
-
SHA1
486806ab57737402351bd526255d4fd3cff624f3
-
SHA256
b99acd2fc2bf1092ca17c153979656ab83c5958fc26b75d1d340534fd4474068
-
SHA512
734b9b2e3c42bb7a5d9ead8fba0658033524e13c71b4562cc91710d4cf3e4e8e685687ce9e885d3587426fcbfa843ff7a768f4a13e0c08f8718e5e95e6a81b0f
-
SSDEEP
12288:Qy90CKnam4URoXbNH4njkCtakgq5BhumErGQldanwkHawSVfDR:Qy0namvRoXbNYnjkCChmErG0tkfSdDR
Static task
static1
Behavioral task
behavioral1
Sample
b99acd2fc2bf1092ca17c153979656ab83c5958fc26b75d1d340534fd4474068N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b99acd2fc2bf1092ca17c153979656ab83c5958fc26b75d1d340534fd4474068N.exe
-
Size
624KB
-
MD5
72dcd16e54e21ee8dd22323f4a843040
-
SHA1
486806ab57737402351bd526255d4fd3cff624f3
-
SHA256
b99acd2fc2bf1092ca17c153979656ab83c5958fc26b75d1d340534fd4474068
-
SHA512
734b9b2e3c42bb7a5d9ead8fba0658033524e13c71b4562cc91710d4cf3e4e8e685687ce9e885d3587426fcbfa843ff7a768f4a13e0c08f8718e5e95e6a81b0f
-
SSDEEP
12288:Qy90CKnam4URoXbNH4njkCtakgq5BhumErGQldanwkHawSVfDR:Qy0namvRoXbNYnjkCChmErG0tkfSdDR
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1