General
-
Target
4e84d62ce1f70efefa89d2d2856c5c21741e14699a867480e136195d8b3f84a8
-
Size
690KB
-
Sample
241110-15r2pawfjr
-
MD5
f82be58048092286b61b74ebd43a8ba2
-
SHA1
5917accdbc7e2c2f81d1581a817c5395846b2f23
-
SHA256
4e84d62ce1f70efefa89d2d2856c5c21741e14699a867480e136195d8b3f84a8
-
SHA512
29f6ce3052a02f7bf5a756e515895c80cdae83241293fa375bf2b9bd7004c47f00a08a09cadb061c75157e95fdef4e18149b1a235907eceab7af4f90ad69beb2
-
SSDEEP
12288:1y905aXVBRFB+HYARjOZ/czVAzI7O6HBuGDQ39dcdG:1yqalbFKFwcxBuGkSG
Static task
static1
Behavioral task
behavioral1
Sample
4e84d62ce1f70efefa89d2d2856c5c21741e14699a867480e136195d8b3f84a8.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
4e84d62ce1f70efefa89d2d2856c5c21741e14699a867480e136195d8b3f84a8
-
Size
690KB
-
MD5
f82be58048092286b61b74ebd43a8ba2
-
SHA1
5917accdbc7e2c2f81d1581a817c5395846b2f23
-
SHA256
4e84d62ce1f70efefa89d2d2856c5c21741e14699a867480e136195d8b3f84a8
-
SHA512
29f6ce3052a02f7bf5a756e515895c80cdae83241293fa375bf2b9bd7004c47f00a08a09cadb061c75157e95fdef4e18149b1a235907eceab7af4f90ad69beb2
-
SSDEEP
12288:1y905aXVBRFB+HYARjOZ/czVAzI7O6HBuGDQ39dcdG:1yqalbFKFwcxBuGkSG
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1