General
-
Target
cfd131a850cb7a9398062dcb81a59ad52e73036160016e13d6f54f7a9f59d459
-
Size
806KB
-
Sample
241104-q5plfszhqc
-
MD5
f071c42bce262478335cb9d20f31dd12
-
SHA1
82207af11578b81ac141e9ee3ddd7846f553f12a
-
SHA256
cfd131a850cb7a9398062dcb81a59ad52e73036160016e13d6f54f7a9f59d459
-
SHA512
da5967565c16ce32ece134f72f6c6552dc8a5bdc8daec5caa84e5180b7a2209968ab6560819d8a8803f287d9b4f19c22b98a856098c45d97fd8f0fe790704032
-
SSDEEP
12288:Zy90J+sV+6wRgkB5dwMhmpNkipDmhFix1FvkXR18jMaTs4zen4Bbpa:Zy4+UWgM5dRASqfNMaTjK4B4
Static task
static1
Behavioral task
behavioral1
Sample
cfd131a850cb7a9398062dcb81a59ad52e73036160016e13d6f54f7a9f59d459.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
cfd131a850cb7a9398062dcb81a59ad52e73036160016e13d6f54f7a9f59d459
-
Size
806KB
-
MD5
f071c42bce262478335cb9d20f31dd12
-
SHA1
82207af11578b81ac141e9ee3ddd7846f553f12a
-
SHA256
cfd131a850cb7a9398062dcb81a59ad52e73036160016e13d6f54f7a9f59d459
-
SHA512
da5967565c16ce32ece134f72f6c6552dc8a5bdc8daec5caa84e5180b7a2209968ab6560819d8a8803f287d9b4f19c22b98a856098c45d97fd8f0fe790704032
-
SSDEEP
12288:Zy90J+sV+6wRgkB5dwMhmpNkipDmhFix1FvkXR18jMaTs4zen4Bbpa:Zy4+UWgM5dRASqfNMaTjK4B4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1