General
-
Target
9f37c0b0c47985aacd3c35197465a5e1ad63caa1ee66680972756ddb0081121eN.exe
-
Size
610KB
-
Sample
241119-weamhaynfw
-
MD5
6d767c4395b760b78e2781fe2a16c3a0
-
SHA1
19fca37fec7b85403f0afba3aa9cf215b64aa5da
-
SHA256
9f37c0b0c47985aacd3c35197465a5e1ad63caa1ee66680972756ddb0081121e
-
SHA512
2b437c75bc0b9f55b257d94e8a95c6df90f100fe7c40bc62a227744cd40c8f791043a9054961ba7898876289bfacedb7ce32735ba921b1aa9276c5461fcf2f23
-
SSDEEP
12288:Ay90GvPTTZCyp9+BYKHWaYrYNcabZJgv6aRAmqan:AyDPJzWBYK2aNccrg3mmZn
Static task
static1
Behavioral task
behavioral1
Sample
9f37c0b0c47985aacd3c35197465a5e1ad63caa1ee66680972756ddb0081121eN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9f37c0b0c47985aacd3c35197465a5e1ad63caa1ee66680972756ddb0081121eN.exe
-
Size
610KB
-
MD5
6d767c4395b760b78e2781fe2a16c3a0
-
SHA1
19fca37fec7b85403f0afba3aa9cf215b64aa5da
-
SHA256
9f37c0b0c47985aacd3c35197465a5e1ad63caa1ee66680972756ddb0081121e
-
SHA512
2b437c75bc0b9f55b257d94e8a95c6df90f100fe7c40bc62a227744cd40c8f791043a9054961ba7898876289bfacedb7ce32735ba921b1aa9276c5461fcf2f23
-
SSDEEP
12288:Ay90GvPTTZCyp9+BYKHWaYrYNcabZJgv6aRAmqan:AyDPJzWBYK2aNccrg3mmZn
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1