General
-
Target
658edd6a6fd782e2ee8807016659e914deae065b893e19ad3bbfb4b399bb28fa
-
Size
919KB
-
Sample
241110-13naqazkap
-
MD5
2c51f47da4b381a564f9867fe6f094bc
-
SHA1
c6ad77719c0d8e6a1861daadc1e6344ef18bf150
-
SHA256
658edd6a6fd782e2ee8807016659e914deae065b893e19ad3bbfb4b399bb28fa
-
SHA512
aee0e4f70c4b880ad4f297137b114c24809298825318a65613d38de5586f97e71ae42a7e78a918baccfd895db0105e394191b3149d495f5f4fd6c8e0a597a812
-
SSDEEP
24576:wydpgLRb1xsf5MFcV1KUbgMe20iGYYTu:3bgxsf7PgMeqQ
Static task
static1
Behavioral task
behavioral1
Sample
658edd6a6fd782e2ee8807016659e914deae065b893e19ad3bbfb4b399bb28fa.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
658edd6a6fd782e2ee8807016659e914deae065b893e19ad3bbfb4b399bb28fa
-
Size
919KB
-
MD5
2c51f47da4b381a564f9867fe6f094bc
-
SHA1
c6ad77719c0d8e6a1861daadc1e6344ef18bf150
-
SHA256
658edd6a6fd782e2ee8807016659e914deae065b893e19ad3bbfb4b399bb28fa
-
SHA512
aee0e4f70c4b880ad4f297137b114c24809298825318a65613d38de5586f97e71ae42a7e78a918baccfd895db0105e394191b3149d495f5f4fd6c8e0a597a812
-
SSDEEP
24576:wydpgLRb1xsf5MFcV1KUbgMe20iGYYTu:3bgxsf7PgMeqQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1