General
-
Target
92dd655bc7a7eaa8c99b2c605152178cbf3ff5b5fe8af0ffdd44f14290ee0991
-
Size
414KB
-
Sample
241122-ckxvfayjcj
-
MD5
91bd32504ca92c1348e802b642e076ad
-
SHA1
522b732b0e2c93fa3c74984bae98881123395290
-
SHA256
92dd655bc7a7eaa8c99b2c605152178cbf3ff5b5fe8af0ffdd44f14290ee0991
-
SHA512
9d7c0a3de7b7b233e8862658f6c57596d768f86203bb5ce7968c83546a921a28749bd64891bbd851ed155ccc425c1f3bb46e8a2dce0390289ee1f4ee504a98d3
-
SSDEEP
6144:tYp0yN90QEjM21rZwTePb0a8FOgxuyeGkwXlQDoZCGLMw/c7:7y90hMIZwTeH8FOgXLlQ8Y5h7
Static task
static1
Behavioral task
behavioral1
Sample
92dd655bc7a7eaa8c99b2c605152178cbf3ff5b5fe8af0ffdd44f14290ee0991.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
92dd655bc7a7eaa8c99b2c605152178cbf3ff5b5fe8af0ffdd44f14290ee0991
-
Size
414KB
-
MD5
91bd32504ca92c1348e802b642e076ad
-
SHA1
522b732b0e2c93fa3c74984bae98881123395290
-
SHA256
92dd655bc7a7eaa8c99b2c605152178cbf3ff5b5fe8af0ffdd44f14290ee0991
-
SHA512
9d7c0a3de7b7b233e8862658f6c57596d768f86203bb5ce7968c83546a921a28749bd64891bbd851ed155ccc425c1f3bb46e8a2dce0390289ee1f4ee504a98d3
-
SSDEEP
6144:tYp0yN90QEjM21rZwTePb0a8FOgxuyeGkwXlQDoZCGLMw/c7:7y90hMIZwTeH8FOgXLlQ8Y5h7
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1