General
-
Target
1de90d8b17dfb37508091a08dbff2b18888ac3f96503a929318b67c97fdeeada
-
Size
696KB
-
Sample
241109-d49h1swkfz
-
MD5
43a5e6dce9a203842e2245174b2df7b2
-
SHA1
71ad66773736447b4581b5b5e243bb35d395f3da
-
SHA256
1de90d8b17dfb37508091a08dbff2b18888ac3f96503a929318b67c97fdeeada
-
SHA512
ea5de5a47a70f9de6791e6b61a7c1de324d04615e82ca8d63ad1f15f6e5ac91e52b615b7b330629812ac762285056fcebfc1f71f9d0bb0fdd27386e8a4cb93fa
-
SSDEEP
12288:4y90r0m5CKXMkE+W+7iTjWK7qwaGA6Ih0fwxgXUwQzdlcU4MxQ+af:4y80m5/Q+HiHWwCvh0GgkwQuMxQvf
Static task
static1
Behavioral task
behavioral1
Sample
1de90d8b17dfb37508091a08dbff2b18888ac3f96503a929318b67c97fdeeada.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1de90d8b17dfb37508091a08dbff2b18888ac3f96503a929318b67c97fdeeada
-
Size
696KB
-
MD5
43a5e6dce9a203842e2245174b2df7b2
-
SHA1
71ad66773736447b4581b5b5e243bb35d395f3da
-
SHA256
1de90d8b17dfb37508091a08dbff2b18888ac3f96503a929318b67c97fdeeada
-
SHA512
ea5de5a47a70f9de6791e6b61a7c1de324d04615e82ca8d63ad1f15f6e5ac91e52b615b7b330629812ac762285056fcebfc1f71f9d0bb0fdd27386e8a4cb93fa
-
SSDEEP
12288:4y90r0m5CKXMkE+W+7iTjWK7qwaGA6Ih0fwxgXUwQzdlcU4MxQ+af:4y80m5/Q+HiHWwCvh0GgkwQuMxQvf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1