General
-
Target
2906434d176287c10f8797d9bb00928dd8ee404fa296cabfbc7536e4fbf0aba5N.exe
-
Size
414KB
-
Sample
241122-xlv3fssldl
-
MD5
0accb6e320a0a5426c5e7db8773c44e0
-
SHA1
cf77570f29c0a25b06a133685926de41c78fcb49
-
SHA256
2906434d176287c10f8797d9bb00928dd8ee404fa296cabfbc7536e4fbf0aba5
-
SHA512
09d5b1560ebe505c10e91550d2e2919c929e733e49ac72995c8a499a0c9c06b227678d63d636cc7fd842ae8c5a8146477a6577c967292ed290ba1a053a1dbace
-
SSDEEP
6144:2kp0yN90QEjKBBsCzWh0x8oML7PUvuhUACyyjfEpC3nVlwI6:Iy90puBPC0daz4/tjfC0HA
Static task
static1
Behavioral task
behavioral1
Sample
2906434d176287c10f8797d9bb00928dd8ee404fa296cabfbc7536e4fbf0aba5N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2906434d176287c10f8797d9bb00928dd8ee404fa296cabfbc7536e4fbf0aba5N.exe
-
Size
414KB
-
MD5
0accb6e320a0a5426c5e7db8773c44e0
-
SHA1
cf77570f29c0a25b06a133685926de41c78fcb49
-
SHA256
2906434d176287c10f8797d9bb00928dd8ee404fa296cabfbc7536e4fbf0aba5
-
SHA512
09d5b1560ebe505c10e91550d2e2919c929e733e49ac72995c8a499a0c9c06b227678d63d636cc7fd842ae8c5a8146477a6577c967292ed290ba1a053a1dbace
-
SSDEEP
6144:2kp0yN90QEjKBBsCzWh0x8oML7PUvuhUACyyjfEpC3nVlwI6:Iy90puBPC0daz4/tjfC0HA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1