General
-
Target
b48ba90faa714a8387b43e098ccf6d72a401152ac4f55e882c79443a5715f67b.exe
-
Size
1.1MB
-
Sample
241120-cj9gvayern
-
MD5
0e228ea8e6f9dc1390f1d51d5f0b661e
-
SHA1
535d61349ffaf8effcfea271a3083c4ec0a135a7
-
SHA256
b48ba90faa714a8387b43e098ccf6d72a401152ac4f55e882c79443a5715f67b
-
SHA512
5261fbec095b1f453e23de160148f0413f799c2b50acf12f61bad30b4c9e6e65678b66a9e1738d8b3505f52dbeeb7ecdf4353452ae46530df3a141c5935473aa
-
SSDEEP
24576:gyrKxOytUAEts2Q/EasZYZXLFWteaHqeuOijEfsSltmw9rWHdhE:nrsftULt/6ExZYZLYMaHqGijEfHtmIEg
Static task
static1
Behavioral task
behavioral1
Sample
b48ba90faa714a8387b43e098ccf6d72a401152ac4f55e882c79443a5715f67b.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b48ba90faa714a8387b43e098ccf6d72a401152ac4f55e882c79443a5715f67b.exe
-
Size
1.1MB
-
MD5
0e228ea8e6f9dc1390f1d51d5f0b661e
-
SHA1
535d61349ffaf8effcfea271a3083c4ec0a135a7
-
SHA256
b48ba90faa714a8387b43e098ccf6d72a401152ac4f55e882c79443a5715f67b
-
SHA512
5261fbec095b1f453e23de160148f0413f799c2b50acf12f61bad30b4c9e6e65678b66a9e1738d8b3505f52dbeeb7ecdf4353452ae46530df3a141c5935473aa
-
SSDEEP
24576:gyrKxOytUAEts2Q/EasZYZXLFWteaHqeuOijEfsSltmw9rWHdhE:nrsftULt/6ExZYZLYMaHqGijEfHtmIEg
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1