General
-
Target
828e1ac899b3e47895182811dfea5c20a4ffbf50707f7b95f74fff9e5095d7ea
-
Size
694KB
-
Sample
241109-fpq48sxmfw
-
MD5
2deaff136047a2b1b6d2f127b3da465a
-
SHA1
aec22e9b4675c6ecae84edbe6f85f56ebba2b14a
-
SHA256
828e1ac899b3e47895182811dfea5c20a4ffbf50707f7b95f74fff9e5095d7ea
-
SHA512
f1f83473b7fae8102ce9987e572402beb35a0ff8397a0450c3c3689d56ee09192137a0ebe73e4851742b55ec10deebdc1dacb447836d55bdf7b65d0b8a43b732
-
SSDEEP
12288:ey90Rt7t0yG2ti4ZI9WOwcHNUrBIhMKrzb6IrwZGVN77z/KWTnNc8:eyk7E2Q4OiCNcBezPcON77zZjy8
Static task
static1
Behavioral task
behavioral1
Sample
828e1ac899b3e47895182811dfea5c20a4ffbf50707f7b95f74fff9e5095d7ea.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
828e1ac899b3e47895182811dfea5c20a4ffbf50707f7b95f74fff9e5095d7ea
-
Size
694KB
-
MD5
2deaff136047a2b1b6d2f127b3da465a
-
SHA1
aec22e9b4675c6ecae84edbe6f85f56ebba2b14a
-
SHA256
828e1ac899b3e47895182811dfea5c20a4ffbf50707f7b95f74fff9e5095d7ea
-
SHA512
f1f83473b7fae8102ce9987e572402beb35a0ff8397a0450c3c3689d56ee09192137a0ebe73e4851742b55ec10deebdc1dacb447836d55bdf7b65d0b8a43b732
-
SSDEEP
12288:ey90Rt7t0yG2ti4ZI9WOwcHNUrBIhMKrzb6IrwZGVN77z/KWTnNc8:eyk7E2Q4OiCNcBezPcON77zZjy8
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1