General
-
Target
f2052749ba005a7f11733c90454bb681e9057edd4937bc0d2b483ff832f2e016
-
Size
1.3MB
-
Sample
241110-1f8m5svhrl
-
MD5
6e98fade1aad97501ff78e3b9f5ab095
-
SHA1
b929c06d9c452535ca8a574057377fd409ecbaef
-
SHA256
f2052749ba005a7f11733c90454bb681e9057edd4937bc0d2b483ff832f2e016
-
SHA512
4d5df713f93d4013f7ad6631e6fe29f7aec8caae4ae08217f05439bf8ab4e3c82f13caf5050ee6563d69262ac63e361ef093aceafc886593564e107e795a642d
-
SSDEEP
24576:mIKq5dNtV7We2GWqerZwO7Fk8YxeU5F8Si5LO+rImHhAs4ew2Hk4Q:mI/NKeU1ZwO+eUv8Sima5u4
Static task
static1
Behavioral task
behavioral1
Sample
f2052749ba005a7f11733c90454bb681e9057edd4937bc0d2b483ff832f2e016.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f2052749ba005a7f11733c90454bb681e9057edd4937bc0d2b483ff832f2e016.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f2052749ba005a7f11733c90454bb681e9057edd4937bc0d2b483ff832f2e016
-
Size
1.3MB
-
MD5
6e98fade1aad97501ff78e3b9f5ab095
-
SHA1
b929c06d9c452535ca8a574057377fd409ecbaef
-
SHA256
f2052749ba005a7f11733c90454bb681e9057edd4937bc0d2b483ff832f2e016
-
SHA512
4d5df713f93d4013f7ad6631e6fe29f7aec8caae4ae08217f05439bf8ab4e3c82f13caf5050ee6563d69262ac63e361ef093aceafc886593564e107e795a642d
-
SSDEEP
24576:mIKq5dNtV7We2GWqerZwO7Fk8YxeU5F8Si5LO+rImHhAs4ew2Hk4Q:mI/NKeU1ZwO+eUv8Sima5u4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1