General
-
Target
bbc8033697d68672723af5e36ecade94ca02dbf00cd7f2f127c79f3151328d4e.exe
-
Size
610KB
-
Sample
241119-tzfyxaxret
-
MD5
e6a7dd3cabf6fdafd95a9c7d4f255afd
-
SHA1
8c9db9e588a1a90d13e044510a8c5985d70eff7e
-
SHA256
bbc8033697d68672723af5e36ecade94ca02dbf00cd7f2f127c79f3151328d4e
-
SHA512
40e9c0f968fd13afce11b299c44ed5cb5cbfbee74d70dd350f157c4b5298d961e43911022174c9286d76e65b28f4ac2ee4629c41467f3a63c66b1eabe515f616
-
SSDEEP
12288:py90z7jIfNNDjzPbDfkbIh85Sn6NbZJgvOaRMkF:pySEZiIhb61rgrakF
Static task
static1
Behavioral task
behavioral1
Sample
bbc8033697d68672723af5e36ecade94ca02dbf00cd7f2f127c79f3151328d4e.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
bbc8033697d68672723af5e36ecade94ca02dbf00cd7f2f127c79f3151328d4e.exe
-
Size
610KB
-
MD5
e6a7dd3cabf6fdafd95a9c7d4f255afd
-
SHA1
8c9db9e588a1a90d13e044510a8c5985d70eff7e
-
SHA256
bbc8033697d68672723af5e36ecade94ca02dbf00cd7f2f127c79f3151328d4e
-
SHA512
40e9c0f968fd13afce11b299c44ed5cb5cbfbee74d70dd350f157c4b5298d961e43911022174c9286d76e65b28f4ac2ee4629c41467f3a63c66b1eabe515f616
-
SSDEEP
12288:py90z7jIfNNDjzPbDfkbIh85Sn6NbZJgvOaRMkF:pySEZiIhb61rgrakF
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1