General
-
Target
de3f9af3748a773902b4762e92db320dae6ce76503ff75a6c2d0768e59c5cd62.exe
-
Size
568KB
-
Sample
241120-f6c9pssfrk
-
MD5
38a2eb46acd0e442952448f6d7dc2b4f
-
SHA1
94e5cafbec7347cd94a0906becafb890e78be0af
-
SHA256
de3f9af3748a773902b4762e92db320dae6ce76503ff75a6c2d0768e59c5cd62
-
SHA512
de587e2bf192a7cb2d0574f564d6ec454edee2b6bb842677f26350df3c8ebfd2d31544a0b99e2f4da29bccd9b13c5c13e77c9ba237a087786d128c9dd37f8cbd
-
SSDEEP
12288:Ay90vvbKgnqQXu16+enfPw8+3FTvqv0S7vygJVpWz:AyMDln3Xu1Ena1vqv0SbpWz
Static task
static1
Behavioral task
behavioral1
Sample
de3f9af3748a773902b4762e92db320dae6ce76503ff75a6c2d0768e59c5cd62.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
de3f9af3748a773902b4762e92db320dae6ce76503ff75a6c2d0768e59c5cd62.exe
-
Size
568KB
-
MD5
38a2eb46acd0e442952448f6d7dc2b4f
-
SHA1
94e5cafbec7347cd94a0906becafb890e78be0af
-
SHA256
de3f9af3748a773902b4762e92db320dae6ce76503ff75a6c2d0768e59c5cd62
-
SHA512
de587e2bf192a7cb2d0574f564d6ec454edee2b6bb842677f26350df3c8ebfd2d31544a0b99e2f4da29bccd9b13c5c13e77c9ba237a087786d128c9dd37f8cbd
-
SSDEEP
12288:Ay90vvbKgnqQXu16+enfPw8+3FTvqv0S7vygJVpWz:AyMDln3Xu1Ena1vqv0SbpWz
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1