General
-
Target
f9734db59ef906dbd0b61f02582810cf9e2a3096c7976df07217bc3123eeb701.exe
-
Size
406KB
-
Sample
241120-c4117stlgl
-
MD5
b7523ce55a971b976fa86a806b817ee2
-
SHA1
dafc2ddccf0f7149d20780791802a05976385e45
-
SHA256
f9734db59ef906dbd0b61f02582810cf9e2a3096c7976df07217bc3123eeb701
-
SHA512
48f2f17048c54c4e3af6f5143dfabcc2aa007a5f1d19635e4cf03b123a79f8d166e0602e19c48cb29b5fadba7654d71bff018d1013b18e57da0cdb988b539ce5
-
SSDEEP
12288:By90WVWg6K4QbphUavFTn1B0udVJnH8sY:ByJB63CrRiy8sY
Static task
static1
Behavioral task
behavioral1
Sample
f9734db59ef906dbd0b61f02582810cf9e2a3096c7976df07217bc3123eeb701.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f9734db59ef906dbd0b61f02582810cf9e2a3096c7976df07217bc3123eeb701.exe
-
Size
406KB
-
MD5
b7523ce55a971b976fa86a806b817ee2
-
SHA1
dafc2ddccf0f7149d20780791802a05976385e45
-
SHA256
f9734db59ef906dbd0b61f02582810cf9e2a3096c7976df07217bc3123eeb701
-
SHA512
48f2f17048c54c4e3af6f5143dfabcc2aa007a5f1d19635e4cf03b123a79f8d166e0602e19c48cb29b5fadba7654d71bff018d1013b18e57da0cdb988b539ce5
-
SSDEEP
12288:By90WVWg6K4QbphUavFTn1B0udVJnH8sY:ByJB63CrRiy8sY
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1