General
-
Target
d401eaed16c6c40f7161e7c78533e013e37a145e3ec7b4ac733794cdfbe24400
-
Size
696KB
-
Sample
241109-f247maydka
-
MD5
15534a5d8eb24b0367421dba4988ff87
-
SHA1
f51d0009e444bf9908316d21c1b167b3f4539a24
-
SHA256
d401eaed16c6c40f7161e7c78533e013e37a145e3ec7b4ac733794cdfbe24400
-
SHA512
15a14d8188de02d7adac3a5faee8763b280854aff3879c8d7d34e61a6d54d38c85a14beb0c05d08637c1eff111e9f282170282dc940d4eeabb4907843e4c8a93
-
SSDEEP
12288:Dy90UhgQplkawnm0SS2pgdgsJGLADSBrXXxwomZB8lHR:DyZFlUm0SShPQLAOVwom8lx
Static task
static1
Behavioral task
behavioral1
Sample
d401eaed16c6c40f7161e7c78533e013e37a145e3ec7b4ac733794cdfbe24400.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d401eaed16c6c40f7161e7c78533e013e37a145e3ec7b4ac733794cdfbe24400
-
Size
696KB
-
MD5
15534a5d8eb24b0367421dba4988ff87
-
SHA1
f51d0009e444bf9908316d21c1b167b3f4539a24
-
SHA256
d401eaed16c6c40f7161e7c78533e013e37a145e3ec7b4ac733794cdfbe24400
-
SHA512
15a14d8188de02d7adac3a5faee8763b280854aff3879c8d7d34e61a6d54d38c85a14beb0c05d08637c1eff111e9f282170282dc940d4eeabb4907843e4c8a93
-
SSDEEP
12288:Dy90UhgQplkawnm0SS2pgdgsJGLADSBrXXxwomZB8lHR:DyZFlUm0SShPQLAOVwom8lx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1