General
-
Target
e38c4efffdd779becc613d9d40b288d49878092e6f5c0fe85ee14483101ca2e7.exe
-
Size
542KB
-
Sample
241119-x6a8sawjer
-
MD5
51539ff14b7ddd47d9dced2cacf6ff6a
-
SHA1
e46ccd620e2e49ce74cc84d3decf64a2a9ac4803
-
SHA256
e38c4efffdd779becc613d9d40b288d49878092e6f5c0fe85ee14483101ca2e7
-
SHA512
2c401e3cebb12b3cbfe8f52158a3004457b7d0f3cf9dba9fcfbb9f8a998ca8725ca62eb0deb4d2e9b585d1a8fc9d03475be08459fe9813784312c760d2faafc0
-
SSDEEP
12288:My9008R+VsmUhKyWMzplYxeUMtIPzYacIxkytq0SbZehwtza:MydV5GdSMgbk1bZiGza
Static task
static1
Behavioral task
behavioral1
Sample
e38c4efffdd779becc613d9d40b288d49878092e6f5c0fe85ee14483101ca2e7.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e38c4efffdd779becc613d9d40b288d49878092e6f5c0fe85ee14483101ca2e7.exe
-
Size
542KB
-
MD5
51539ff14b7ddd47d9dced2cacf6ff6a
-
SHA1
e46ccd620e2e49ce74cc84d3decf64a2a9ac4803
-
SHA256
e38c4efffdd779becc613d9d40b288d49878092e6f5c0fe85ee14483101ca2e7
-
SHA512
2c401e3cebb12b3cbfe8f52158a3004457b7d0f3cf9dba9fcfbb9f8a998ca8725ca62eb0deb4d2e9b585d1a8fc9d03475be08459fe9813784312c760d2faafc0
-
SSDEEP
12288:My9008R+VsmUhKyWMzplYxeUMtIPzYacIxkytq0SbZehwtza:MydV5GdSMgbk1bZiGza
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1