General
-
Target
3a709d995a745e3dbb2fa6c8b21dfd4db934e992b2e491c77b31a339b45188ae
-
Size
708KB
-
Sample
241121-22egvszmbz
-
MD5
6b230639ba3b916f3f3b67f8191ede02
-
SHA1
9706fa122f6d94814c3c91b4b529cd3fdca1f367
-
SHA256
3a709d995a745e3dbb2fa6c8b21dfd4db934e992b2e491c77b31a339b45188ae
-
SHA512
a9176d18d3c3aac09a386eb6a78b2dd534ad71fe86ecef6e53cce33cd5806bf39ddf1cfd6690f21555f0f095410a7f72b9cb48c4f9c195e81f1a11fb2ea8570c
-
SSDEEP
12288:Fy90saboV+K4wTBBbohZZYUw5qSi6uKXtusncIsAye2xQj:FyjV+KlTfbOnYpqSFNnCAR2xE
Static task
static1
Behavioral task
behavioral1
Sample
3a709d995a745e3dbb2fa6c8b21dfd4db934e992b2e491c77b31a339b45188ae.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
3a709d995a745e3dbb2fa6c8b21dfd4db934e992b2e491c77b31a339b45188ae
-
Size
708KB
-
MD5
6b230639ba3b916f3f3b67f8191ede02
-
SHA1
9706fa122f6d94814c3c91b4b529cd3fdca1f367
-
SHA256
3a709d995a745e3dbb2fa6c8b21dfd4db934e992b2e491c77b31a339b45188ae
-
SHA512
a9176d18d3c3aac09a386eb6a78b2dd534ad71fe86ecef6e53cce33cd5806bf39ddf1cfd6690f21555f0f095410a7f72b9cb48c4f9c195e81f1a11fb2ea8570c
-
SSDEEP
12288:Fy90saboV+K4wTBBbohZZYUw5qSi6uKXtusncIsAye2xQj:FyjV+KlTfbOnYpqSFNnCAR2xE
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1