General
-
Target
d32a8401b857fbb891912abead93dfaae79b11991588e406a49442b3ee42542a
-
Size
651KB
-
Sample
241104-rew4aatlcj
-
MD5
0d89c92c25eb0de4083f264e5bc3a2ec
-
SHA1
fbbb72707460e091862a4e2a5e59caf10467f84f
-
SHA256
d32a8401b857fbb891912abead93dfaae79b11991588e406a49442b3ee42542a
-
SHA512
9afb8140bb749daa58e8cd6a91af101e7cd497b852e769bd6b7699e67ccc2e795bd86b809023f7c6329463298b9b5c0aaa1e214ef79971e31968e21febe9f6bb
-
SSDEEP
12288:Vy90Kd9yj0vb83UtJ/PJiPSaOj1g8gWClW0wxH2XmQVxOO+4FIDU:Vy3d9EIuUtJ/PJISMeV2X5COnFIo
Static task
static1
Behavioral task
behavioral1
Sample
d32a8401b857fbb891912abead93dfaae79b11991588e406a49442b3ee42542a.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d32a8401b857fbb891912abead93dfaae79b11991588e406a49442b3ee42542a
-
Size
651KB
-
MD5
0d89c92c25eb0de4083f264e5bc3a2ec
-
SHA1
fbbb72707460e091862a4e2a5e59caf10467f84f
-
SHA256
d32a8401b857fbb891912abead93dfaae79b11991588e406a49442b3ee42542a
-
SHA512
9afb8140bb749daa58e8cd6a91af101e7cd497b852e769bd6b7699e67ccc2e795bd86b809023f7c6329463298b9b5c0aaa1e214ef79971e31968e21febe9f6bb
-
SSDEEP
12288:Vy90Kd9yj0vb83UtJ/PJiPSaOj1g8gWClW0wxH2XmQVxOO+4FIDU:Vy3d9EIuUtJ/PJISMeV2X5COnFIo
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1