General
-
Target
8cff35c7144af45f7015c9590889b931730a341c73354e745bd07b371c32e206.exe
-
Size
469KB
-
Sample
241119-qfz1wsxcjm
-
MD5
dcfb7b2b8b47479a63262333981504db
-
SHA1
962656be91ca1a6e5351fdaa7e1364bdd4f4ee37
-
SHA256
8cff35c7144af45f7015c9590889b931730a341c73354e745bd07b371c32e206
-
SHA512
295a8a29f7819bed4865e026c8c7d6f92c922450294a73db0efd08b190453fb2bd6901908998e905185388799e8f24574d4cc2d6c0c69c9b9b12e6c8d854d451
-
SSDEEP
6144:aIp0yN90QEmLbd9xtD1Q7ghWamyjzDscMvEQrdmpWZdNL1Uk5p33aagds2BMA:cy90mblQ7gSozDYsQxmyn3KaYs2BMA
Static task
static1
Behavioral task
behavioral1
Sample
8cff35c7144af45f7015c9590889b931730a341c73354e745bd07b371c32e206.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8cff35c7144af45f7015c9590889b931730a341c73354e745bd07b371c32e206.exe
-
Size
469KB
-
MD5
dcfb7b2b8b47479a63262333981504db
-
SHA1
962656be91ca1a6e5351fdaa7e1364bdd4f4ee37
-
SHA256
8cff35c7144af45f7015c9590889b931730a341c73354e745bd07b371c32e206
-
SHA512
295a8a29f7819bed4865e026c8c7d6f92c922450294a73db0efd08b190453fb2bd6901908998e905185388799e8f24574d4cc2d6c0c69c9b9b12e6c8d854d451
-
SSDEEP
6144:aIp0yN90QEmLbd9xtD1Q7ghWamyjzDscMvEQrdmpWZdNL1Uk5p33aagds2BMA:cy90mblQ7gSozDYsQxmyn3KaYs2BMA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1