General
-
Target
9be49b4740b9bd38d51d19ea7651067c28199c17aa1c794df1a79fb94bca7d21.exe
-
Size
644KB
-
Sample
241119-rtms6asjdq
-
MD5
fc66e0e35830c3a85f12ddfe1340d2c3
-
SHA1
b20cef411211f78d5b8e3f313eb997a6036fc9ff
-
SHA256
9be49b4740b9bd38d51d19ea7651067c28199c17aa1c794df1a79fb94bca7d21
-
SHA512
334a7a3aa66df77e803478d458292a27dcec9fa1c1964e9db1eb47977f12bb83fcca74eff421c8cc93166882085307f380c1c41455d6eb58ddda1700411eedb9
-
SSDEEP
12288:Ly90Ndpq7kaulJFpSNKBHZqkteDhZJv3QuZRvuGdx0iSHe7Fmmu0okM:Ly0dp6XK1JkvhfvB9Dune7Fe0okM
Static task
static1
Behavioral task
behavioral1
Sample
9be49b4740b9bd38d51d19ea7651067c28199c17aa1c794df1a79fb94bca7d21.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9be49b4740b9bd38d51d19ea7651067c28199c17aa1c794df1a79fb94bca7d21.exe
-
Size
644KB
-
MD5
fc66e0e35830c3a85f12ddfe1340d2c3
-
SHA1
b20cef411211f78d5b8e3f313eb997a6036fc9ff
-
SHA256
9be49b4740b9bd38d51d19ea7651067c28199c17aa1c794df1a79fb94bca7d21
-
SHA512
334a7a3aa66df77e803478d458292a27dcec9fa1c1964e9db1eb47977f12bb83fcca74eff421c8cc93166882085307f380c1c41455d6eb58ddda1700411eedb9
-
SSDEEP
12288:Ly90Ndpq7kaulJFpSNKBHZqkteDhZJv3QuZRvuGdx0iSHe7Fmmu0okM:Ly0dp6XK1JkvhfvB9Dune7Fe0okM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1