General
-
Target
c916381e6d117bb2069b05ec147891cb2bd9a8387128368eebb5028a47611b4f.exe
-
Size
470KB
-
Sample
241119-lnfj1atlc1
-
MD5
1e051393aac7ff367a412107e3756d96
-
SHA1
b52675319545f0cad3431e61d831c6c1942c3f38
-
SHA256
c916381e6d117bb2069b05ec147891cb2bd9a8387128368eebb5028a47611b4f
-
SHA512
b643298166662dee3c19a27cbdd152fea183401fb534537385151021e56ed4086ac60687d0668bd9cb0907141997867278a0bf82ce2a7118eb0a365065065eef
-
SSDEEP
6144:36p0yN90QErf00m1dVqxHG+LNC0JvWAbaQbay6kk17O8GVdnp63F2dsHIgH:Ly90++G+LY0oAbRjg7ORPMF2S9H
Static task
static1
Behavioral task
behavioral1
Sample
c916381e6d117bb2069b05ec147891cb2bd9a8387128368eebb5028a47611b4f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c916381e6d117bb2069b05ec147891cb2bd9a8387128368eebb5028a47611b4f.exe
-
Size
470KB
-
MD5
1e051393aac7ff367a412107e3756d96
-
SHA1
b52675319545f0cad3431e61d831c6c1942c3f38
-
SHA256
c916381e6d117bb2069b05ec147891cb2bd9a8387128368eebb5028a47611b4f
-
SHA512
b643298166662dee3c19a27cbdd152fea183401fb534537385151021e56ed4086ac60687d0668bd9cb0907141997867278a0bf82ce2a7118eb0a365065065eef
-
SSDEEP
6144:36p0yN90QErf00m1dVqxHG+LNC0JvWAbaQbay6kk17O8GVdnp63F2dsHIgH:Ly90++G+LY0oAbRjg7ORPMF2S9H
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1