General
-
Target
1ff596d06ba6a0f5ed62f20edd7d3ae85339cfcec08ad668f6601254924a2498
-
Size
553KB
-
Sample
241121-y8awgaxjgz
-
MD5
c981bb6cb9eff274acc6968bca7d94a8
-
SHA1
c6c0867512afcf92c126772229d1d9c7132da7a0
-
SHA256
1ff596d06ba6a0f5ed62f20edd7d3ae85339cfcec08ad668f6601254924a2498
-
SHA512
00d4fd8708b6febb14c6d3ba46323535cd89189710dd29630785f5c2adc7571ac365782cf6b867fc99e3777ee9e37e2f481aeba70cfee32c1dd372610db8e024
-
SSDEEP
12288:Uy90pPix46e+TI3jI+i3dxSXtbVncIBAXxKj:Uyqis+0p2e/n3Ae
Static task
static1
Behavioral task
behavioral1
Sample
1ff596d06ba6a0f5ed62f20edd7d3ae85339cfcec08ad668f6601254924a2498.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1ff596d06ba6a0f5ed62f20edd7d3ae85339cfcec08ad668f6601254924a2498
-
Size
553KB
-
MD5
c981bb6cb9eff274acc6968bca7d94a8
-
SHA1
c6c0867512afcf92c126772229d1d9c7132da7a0
-
SHA256
1ff596d06ba6a0f5ed62f20edd7d3ae85339cfcec08ad668f6601254924a2498
-
SHA512
00d4fd8708b6febb14c6d3ba46323535cd89189710dd29630785f5c2adc7571ac365782cf6b867fc99e3777ee9e37e2f481aeba70cfee32c1dd372610db8e024
-
SSDEEP
12288:Uy90pPix46e+TI3jI+i3dxSXtbVncIBAXxKj:Uyqis+0p2e/n3Ae
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1