General
-
Target
c89b749f17e79bd3a8afdd649b8c06da4b0b12aa2546fc3e04dd718a55534c08N.exe
-
Size
830KB
-
Sample
241123-rjmemssngn
-
MD5
b4a9bb3f4848489817dbf3693b1353b0
-
SHA1
590802a9be125ee057d64eefca66754466ea4c77
-
SHA256
c89b749f17e79bd3a8afdd649b8c06da4b0b12aa2546fc3e04dd718a55534c08
-
SHA512
147740749b94d5a508debafb1685aa2e28ea8f0f9d734909d2c8e28fcff8452c2deec2bc50a7aacc36d91c76e127fac132b92a58f6f3a642a8011cada69fd5f1
-
SSDEEP
12288:Ey90wZu1VG/+PwNWdSawkl4x3agBNK5wl19SOlRzwuP:Eyk1VtL1wkl89K83xlBwuP
Static task
static1
Behavioral task
behavioral1
Sample
c89b749f17e79bd3a8afdd649b8c06da4b0b12aa2546fc3e04dd718a55534c08N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c89b749f17e79bd3a8afdd649b8c06da4b0b12aa2546fc3e04dd718a55534c08N.exe
-
Size
830KB
-
MD5
b4a9bb3f4848489817dbf3693b1353b0
-
SHA1
590802a9be125ee057d64eefca66754466ea4c77
-
SHA256
c89b749f17e79bd3a8afdd649b8c06da4b0b12aa2546fc3e04dd718a55534c08
-
SHA512
147740749b94d5a508debafb1685aa2e28ea8f0f9d734909d2c8e28fcff8452c2deec2bc50a7aacc36d91c76e127fac132b92a58f6f3a642a8011cada69fd5f1
-
SSDEEP
12288:Ey90wZu1VG/+PwNWdSawkl4x3agBNK5wl19SOlRzwuP:Eyk1VtL1wkl89K83xlBwuP
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1