General
-
Target
b1be6851c60a64f5b35461dd6bffdb11c09b26a7824b7a31a039d4fb555cab35.exe
-
Size
552KB
-
Sample
241126-m3gw2svkcq
-
MD5
157e80771d328e6f72e7bcda4a2cded9
-
SHA1
fccf79d2bd2af62d109488b3f0b08c2255445113
-
SHA256
b1be6851c60a64f5b35461dd6bffdb11c09b26a7824b7a31a039d4fb555cab35
-
SHA512
b66fc1621aef5f97eeb71b9ed802946bed53cc959a18b7973ddbf0dd716827282f7aa0c191e9f79583ce867b61fed0960fdd1775418be1fdd0e8d486d4fd3afb
-
SSDEEP
12288:Ay90MS6cBYxQwEOfHOWsAGZY/2B5nfpbWb4EVdCBSS:Ay8KrEe1sFU+NpbWb4EvlS
Static task
static1
Behavioral task
behavioral1
Sample
b1be6851c60a64f5b35461dd6bffdb11c09b26a7824b7a31a039d4fb555cab35.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b1be6851c60a64f5b35461dd6bffdb11c09b26a7824b7a31a039d4fb555cab35.exe
-
Size
552KB
-
MD5
157e80771d328e6f72e7bcda4a2cded9
-
SHA1
fccf79d2bd2af62d109488b3f0b08c2255445113
-
SHA256
b1be6851c60a64f5b35461dd6bffdb11c09b26a7824b7a31a039d4fb555cab35
-
SHA512
b66fc1621aef5f97eeb71b9ed802946bed53cc959a18b7973ddbf0dd716827282f7aa0c191e9f79583ce867b61fed0960fdd1775418be1fdd0e8d486d4fd3afb
-
SSDEEP
12288:Ay90MS6cBYxQwEOfHOWsAGZY/2B5nfpbWb4EVdCBSS:Ay8KrEe1sFU+NpbWb4EvlS
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1