General
-
Target
2a7de63c2d429ca7c25a60493919e82ae9b98a750d9b0b0df446cd2d42307a5f
-
Size
611KB
-
Sample
241104-rft1ba1eqk
-
MD5
88c94171a9b8dd5d1c951180a9f81209
-
SHA1
5131ab7c5ffb0eae9a797135fb01e0b920e818c8
-
SHA256
2a7de63c2d429ca7c25a60493919e82ae9b98a750d9b0b0df446cd2d42307a5f
-
SHA512
d33800102022e1e0635f9ec260be136c41f8d5b1ad850a842949172da545f8a3e3fd72c0137b6e6c07f7e9b50a811b90721da6936c28e97d7d67efd48432160e
-
SSDEEP
12288:ky90kPQFQy6QgR7Q83Z8g7KMD9l6etjXidf/SItGzl6oTK0c:ky3PQFQy6Q18p8MfzjXCf/PtGsoM
Static task
static1
Behavioral task
behavioral1
Sample
2a7de63c2d429ca7c25a60493919e82ae9b98a750d9b0b0df446cd2d42307a5f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2a7de63c2d429ca7c25a60493919e82ae9b98a750d9b0b0df446cd2d42307a5f
-
Size
611KB
-
MD5
88c94171a9b8dd5d1c951180a9f81209
-
SHA1
5131ab7c5ffb0eae9a797135fb01e0b920e818c8
-
SHA256
2a7de63c2d429ca7c25a60493919e82ae9b98a750d9b0b0df446cd2d42307a5f
-
SHA512
d33800102022e1e0635f9ec260be136c41f8d5b1ad850a842949172da545f8a3e3fd72c0137b6e6c07f7e9b50a811b90721da6936c28e97d7d67efd48432160e
-
SSDEEP
12288:ky90kPQFQy6QgR7Q83Z8g7KMD9l6etjXidf/SItGzl6oTK0c:ky3PQFQy6Q18p8MfzjXCf/PtGsoM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1