General
-
Target
8c502065826717efc22c3933caa9ff003ed3c80ef38eacf43b0a44fd02a719ce
-
Size
480KB
-
Sample
241110-14t5nazkdn
-
MD5
195791906a139cb2fb6d3108338c9130
-
SHA1
ef1e90caca39e55dedf3bbb754f01e3354baff1f
-
SHA256
8c502065826717efc22c3933caa9ff003ed3c80ef38eacf43b0a44fd02a719ce
-
SHA512
c4d9acb83d6a01b445fb423e835683875b549d9a3881111acdf3fccf13bcc68e02e0b2d0b8ab9d40cdcdd1353138eab56e4b31cc75175ad4caa36266508c9214
-
SSDEEP
12288:xMrWy90tIkqPHZzlXPJvlm4q+TrpqKCrRdN:HyDJRxvE4PT1qr
Static task
static1
Behavioral task
behavioral1
Sample
8c502065826717efc22c3933caa9ff003ed3c80ef38eacf43b0a44fd02a719ce.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8c502065826717efc22c3933caa9ff003ed3c80ef38eacf43b0a44fd02a719ce
-
Size
480KB
-
MD5
195791906a139cb2fb6d3108338c9130
-
SHA1
ef1e90caca39e55dedf3bbb754f01e3354baff1f
-
SHA256
8c502065826717efc22c3933caa9ff003ed3c80ef38eacf43b0a44fd02a719ce
-
SHA512
c4d9acb83d6a01b445fb423e835683875b549d9a3881111acdf3fccf13bcc68e02e0b2d0b8ab9d40cdcdd1353138eab56e4b31cc75175ad4caa36266508c9214
-
SSDEEP
12288:xMrWy90tIkqPHZzlXPJvlm4q+TrpqKCrRdN:HyDJRxvE4PT1qr
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1