General
-
Target
03819d3f01542500577097a837b011e1e8051a0a7ee721ba0e96588402885186.exe
-
Size
569KB
-
Sample
241119-z3atyssnct
-
MD5
62230f82a049348e41039d14d1c49f6d
-
SHA1
2c63c9fe375d042093f7f50e60b3702532a881b4
-
SHA256
03819d3f01542500577097a837b011e1e8051a0a7ee721ba0e96588402885186
-
SHA512
65dd27d5664e4f32ce33dea9a7e730d97fa0c20db8a581a435a7c7e27603955e6429e4b64abc08923d9492ff92f611730735340b4052480273152a892b4dfa46
-
SSDEEP
12288:hy90l6zAOr1OimTR9/Uo2Ppf1W+IBmEwjNusc8DAMRr+g/gx8:hyIOr1OiwvB2P11W+MwjN2YXRrhs8
Static task
static1
Behavioral task
behavioral1
Sample
03819d3f01542500577097a837b011e1e8051a0a7ee721ba0e96588402885186.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
03819d3f01542500577097a837b011e1e8051a0a7ee721ba0e96588402885186.exe
-
Size
569KB
-
MD5
62230f82a049348e41039d14d1c49f6d
-
SHA1
2c63c9fe375d042093f7f50e60b3702532a881b4
-
SHA256
03819d3f01542500577097a837b011e1e8051a0a7ee721ba0e96588402885186
-
SHA512
65dd27d5664e4f32ce33dea9a7e730d97fa0c20db8a581a435a7c7e27603955e6429e4b64abc08923d9492ff92f611730735340b4052480273152a892b4dfa46
-
SSDEEP
12288:hy90l6zAOr1OimTR9/Uo2Ppf1W+IBmEwjNusc8DAMRr+g/gx8:hyIOr1OiwvB2P11W+MwjN2YXRrhs8
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1