General
-
Target
be308a0659ddd02f49648b96ec5906d341bb9cf911453792e0785a85ff5994e2.exe
-
Size
470KB
-
Sample
241119-n3csrsvqfs
-
MD5
e4c7aed2cafaf554c04dfa369c0fc0db
-
SHA1
e3088f7c1ab3e087855bd9e2c738c43d721d6b83
-
SHA256
be308a0659ddd02f49648b96ec5906d341bb9cf911453792e0785a85ff5994e2
-
SHA512
e57638c53b269f627b6d690ddc92a4ba3764ad6577c671ac36682b3ea6ff85ff8ba142a6f0135cf0a9f7de3426bbf79e5d984a707c22eedfba96bedf9651eab7
-
SSDEEP
6144:nup0yN90QEllFmyXTNbK+MZahK6EUMobaQbayckk17Y8GVdj3IGj64aHo:vy90GyXTk+4QK/UbbRJg7YRb3IGj6Vo
Static task
static1
Behavioral task
behavioral1
Sample
be308a0659ddd02f49648b96ec5906d341bb9cf911453792e0785a85ff5994e2.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
be308a0659ddd02f49648b96ec5906d341bb9cf911453792e0785a85ff5994e2.exe
-
Size
470KB
-
MD5
e4c7aed2cafaf554c04dfa369c0fc0db
-
SHA1
e3088f7c1ab3e087855bd9e2c738c43d721d6b83
-
SHA256
be308a0659ddd02f49648b96ec5906d341bb9cf911453792e0785a85ff5994e2
-
SHA512
e57638c53b269f627b6d690ddc92a4ba3764ad6577c671ac36682b3ea6ff85ff8ba142a6f0135cf0a9f7de3426bbf79e5d984a707c22eedfba96bedf9651eab7
-
SSDEEP
6144:nup0yN90QEllFmyXTNbK+MZahK6EUMobaQbayckk17Y8GVdj3IGj64aHo:vy90GyXTk+4QK/UbbRJg7YRb3IGj6Vo
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1