General
-
Target
ea3b6fbb4d48852592727c65fe4b3bebf7c36941a1f703cd7bd5ad7baea6cc4b
-
Size
704KB
-
Sample
241122-fzxprsvmhy
-
MD5
b88a26a8cafcafb49b24316e8695d6cc
-
SHA1
d2f00be63ece81870f211e36c6281357ba24a3a2
-
SHA256
ea3b6fbb4d48852592727c65fe4b3bebf7c36941a1f703cd7bd5ad7baea6cc4b
-
SHA512
d3185d385fabd9b8dfbbcada8d3fa13dfd4e21e21f299f3b48559f619253e3ce89ce1e30a960049bcf47479cb4deed79bb2a4eb5d79debb314a4ffd5c8087be5
-
SSDEEP
12288:my90H9AcgVm1P9PkvurYKL7twTvBDTBqeqvvTMpGBQ:mywA/m1Fcv4n7WlPBqeqvLDBQ
Static task
static1
Behavioral task
behavioral1
Sample
ea3b6fbb4d48852592727c65fe4b3bebf7c36941a1f703cd7bd5ad7baea6cc4b.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ea3b6fbb4d48852592727c65fe4b3bebf7c36941a1f703cd7bd5ad7baea6cc4b
-
Size
704KB
-
MD5
b88a26a8cafcafb49b24316e8695d6cc
-
SHA1
d2f00be63ece81870f211e36c6281357ba24a3a2
-
SHA256
ea3b6fbb4d48852592727c65fe4b3bebf7c36941a1f703cd7bd5ad7baea6cc4b
-
SHA512
d3185d385fabd9b8dfbbcada8d3fa13dfd4e21e21f299f3b48559f619253e3ce89ce1e30a960049bcf47479cb4deed79bb2a4eb5d79debb314a4ffd5c8087be5
-
SSDEEP
12288:my90H9AcgVm1P9PkvurYKL7twTvBDTBqeqvvTMpGBQ:mywA/m1Fcv4n7WlPBqeqvLDBQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1