General
-
Target
c31aee2854129ab49066eb567b13f68f3088d9e930c81285ca490a2905c66ab0
-
Size
479KB
-
Sample
241110-1bvkqawcle
-
MD5
b3f890cfef98402584a109c25e6feb2c
-
SHA1
89ffbf3403612b542fc3eab9daea6dc46e442d80
-
SHA256
c31aee2854129ab49066eb567b13f68f3088d9e930c81285ca490a2905c66ab0
-
SHA512
8c40d7702ca3f69e80a52813cd65c9ca09986299cf256e1cdee332f8f5f7eede7c5088ff002b8107cd39661419349414a36feff73026b87a2696529cfebeb29b
-
SSDEEP
12288:lMrCy90X4OATRVrU5c1u31tT0/zYbGtID+QCx+HbC:bySmoXnTNz+n+Hm
Static task
static1
Behavioral task
behavioral1
Sample
c31aee2854129ab49066eb567b13f68f3088d9e930c81285ca490a2905c66ab0.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c31aee2854129ab49066eb567b13f68f3088d9e930c81285ca490a2905c66ab0
-
Size
479KB
-
MD5
b3f890cfef98402584a109c25e6feb2c
-
SHA1
89ffbf3403612b542fc3eab9daea6dc46e442d80
-
SHA256
c31aee2854129ab49066eb567b13f68f3088d9e930c81285ca490a2905c66ab0
-
SHA512
8c40d7702ca3f69e80a52813cd65c9ca09986299cf256e1cdee332f8f5f7eede7c5088ff002b8107cd39661419349414a36feff73026b87a2696529cfebeb29b
-
SSDEEP
12288:lMrCy90X4OATRVrU5c1u31tT0/zYbGtID+QCx+HbC:bySmoXnTNz+n+Hm
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1