General
-
Target
46d430497d4e43ae32c18b960793c9be4927f7bd932236fb4804ad3dbe10534e
-
Size
1.0MB
-
Sample
241104-rpbkbs1frj
-
MD5
e8d455aaa4fb84ca53d3b03e329949fb
-
SHA1
cd4b76ff47ded31afbc1090dc3e753062403bd32
-
SHA256
46d430497d4e43ae32c18b960793c9be4927f7bd932236fb4804ad3dbe10534e
-
SHA512
b71d6d54cbbec61f669b7d5505f0bab213c17bcea44fc322f141860271990a9e7ed25efd4d341a7f6b886d9d466d2798f7e7e5ec30a5460824299b10547a6379
-
SSDEEP
24576:By6eU8nmA5JYVcMLN+o/gK06BDxhBcXMF:0PUSmALNSECxhBcX
Static task
static1
Behavioral task
behavioral1
Sample
46d430497d4e43ae32c18b960793c9be4927f7bd932236fb4804ad3dbe10534e.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
46d430497d4e43ae32c18b960793c9be4927f7bd932236fb4804ad3dbe10534e
-
Size
1.0MB
-
MD5
e8d455aaa4fb84ca53d3b03e329949fb
-
SHA1
cd4b76ff47ded31afbc1090dc3e753062403bd32
-
SHA256
46d430497d4e43ae32c18b960793c9be4927f7bd932236fb4804ad3dbe10534e
-
SHA512
b71d6d54cbbec61f669b7d5505f0bab213c17bcea44fc322f141860271990a9e7ed25efd4d341a7f6b886d9d466d2798f7e7e5ec30a5460824299b10547a6379
-
SSDEEP
24576:By6eU8nmA5JYVcMLN+o/gK06BDxhBcXMF:0PUSmALNSECxhBcX
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1