General
-
Target
99935c2be64b4e1bde00ffe7ac2eb8350e24865388ed0b44d79655de3b4da147
-
Size
414KB
-
Sample
241122-cwajaayldn
-
MD5
1a37510b299df05f4c398e02cc04f421
-
SHA1
05095d1ea727df289b7d789910215d975c5e2176
-
SHA256
99935c2be64b4e1bde00ffe7ac2eb8350e24865388ed0b44d79655de3b4da147
-
SHA512
3c0d4ec63e03e1fc7ddb87ae52dcd6d8c91bf23ef57e239c233228ad8912674f0372378d867224d4edb92d2acaefca55dfdc79e86f1c216999c90033019a4595
-
SSDEEP
6144:Eip0yN90QE3lXwiutBRS615khcqtSvock/t04aN2ncXYHCAql5hFmkS1:0y90llkt5fkhcurXt0kncIiAz1
Static task
static1
Behavioral task
behavioral1
Sample
99935c2be64b4e1bde00ffe7ac2eb8350e24865388ed0b44d79655de3b4da147.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
99935c2be64b4e1bde00ffe7ac2eb8350e24865388ed0b44d79655de3b4da147
-
Size
414KB
-
MD5
1a37510b299df05f4c398e02cc04f421
-
SHA1
05095d1ea727df289b7d789910215d975c5e2176
-
SHA256
99935c2be64b4e1bde00ffe7ac2eb8350e24865388ed0b44d79655de3b4da147
-
SHA512
3c0d4ec63e03e1fc7ddb87ae52dcd6d8c91bf23ef57e239c233228ad8912674f0372378d867224d4edb92d2acaefca55dfdc79e86f1c216999c90033019a4595
-
SSDEEP
6144:Eip0yN90QE3lXwiutBRS615khcqtSvock/t04aN2ncXYHCAql5hFmkS1:0y90llkt5fkhcurXt0kncIiAz1
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1