General
-
Target
043fcedb17126aa54a8ac47977fccac399e50846f5670bb7448cde4c76887b11
-
Size
936KB
-
Sample
241104-rkmf2a1fll
-
MD5
1059314b7aa9c6a86251f0722a7a643f
-
SHA1
7492275bea94a7405df2f27078c92e1fd900bfb8
-
SHA256
043fcedb17126aa54a8ac47977fccac399e50846f5670bb7448cde4c76887b11
-
SHA512
6b744d5a7970797e389622be98fb9df0ee95d7c791baf4538e1f6208e1e7c56b2418b76d89402b4d457c66e75ab22c8d0d8829d4c8c65c291941285557299206
-
SSDEEP
12288:+y90mg/5r4PHPBk1+DrRAkuS4aCrKVilGMLh3dFZAbjHfdTartyVrtGRwzLMyE:+y61ekwDtAG6KVilGM2EyVKEE
Static task
static1
Behavioral task
behavioral1
Sample
043fcedb17126aa54a8ac47977fccac399e50846f5670bb7448cde4c76887b11.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
043fcedb17126aa54a8ac47977fccac399e50846f5670bb7448cde4c76887b11
-
Size
936KB
-
MD5
1059314b7aa9c6a86251f0722a7a643f
-
SHA1
7492275bea94a7405df2f27078c92e1fd900bfb8
-
SHA256
043fcedb17126aa54a8ac47977fccac399e50846f5670bb7448cde4c76887b11
-
SHA512
6b744d5a7970797e389622be98fb9df0ee95d7c791baf4538e1f6208e1e7c56b2418b76d89402b4d457c66e75ab22c8d0d8829d4c8c65c291941285557299206
-
SSDEEP
12288:+y90mg/5r4PHPBk1+DrRAkuS4aCrKVilGMLh3dFZAbjHfdTartyVrtGRwzLMyE:+y61ekwDtAG6KVilGM2EyVKEE
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1