General
-
Target
026c3e01feef2d953fad2b0ef5e09cb26c9a32ed08a0b629c1f11d3d68300815
-
Size
569KB
-
Sample
241122-x5t99sxjet
-
MD5
55e3a967cd3f2cbb300523351e7934c9
-
SHA1
bad4df4eba874e7b13ed9cbb8595bcfdb17aef49
-
SHA256
026c3e01feef2d953fad2b0ef5e09cb26c9a32ed08a0b629c1f11d3d68300815
-
SHA512
7214acf1aa043958a152ca4bd72a6931723ca8708dc33d5a68d372abf65fa162b71c468e94fe9acf54a283f7e35c502d51c37709d9ee5d5f1745d9fd0ded2639
-
SSDEEP
12288:qy90mbEpD14MMkBMz4BAT843LVnII5nTgnynM:qy5Av4MMFzV8g1IIhgnynM
Static task
static1
Behavioral task
behavioral1
Sample
026c3e01feef2d953fad2b0ef5e09cb26c9a32ed08a0b629c1f11d3d68300815.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
026c3e01feef2d953fad2b0ef5e09cb26c9a32ed08a0b629c1f11d3d68300815
-
Size
569KB
-
MD5
55e3a967cd3f2cbb300523351e7934c9
-
SHA1
bad4df4eba874e7b13ed9cbb8595bcfdb17aef49
-
SHA256
026c3e01feef2d953fad2b0ef5e09cb26c9a32ed08a0b629c1f11d3d68300815
-
SHA512
7214acf1aa043958a152ca4bd72a6931723ca8708dc33d5a68d372abf65fa162b71c468e94fe9acf54a283f7e35c502d51c37709d9ee5d5f1745d9fd0ded2639
-
SSDEEP
12288:qy90mbEpD14MMkBMz4BAT843LVnII5nTgnynM:qy5Av4MMFzV8g1IIhgnynM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1