General
-
Target
e080e7be4adb375605dbf6afb8852a1c1df2e7cc868d3386a9a0f95edf355c76
-
Size
828KB
-
Sample
241110-1kh82svpds
-
MD5
ae682f98ec5a045dd6c9a0bc21b088ba
-
SHA1
3877baf0045d6c8d30ea7547c92ed377b943dd0f
-
SHA256
e080e7be4adb375605dbf6afb8852a1c1df2e7cc868d3386a9a0f95edf355c76
-
SHA512
c8a88995bf3931b5c244c4e3ef29552c3ad7ec76e6b7eeb46ee89e755f7486724b59f6f0101ef287c0e3a5c83f43dfaa0800e452c76838e3885e90d8be1d55f6
-
SSDEEP
12288:Yy908w9O9CAW9YZvBp/0GGNfP2TiGdcPn+UGA95ZiDk0V6xEcg58xsdx38etjhpM:YyDwQ9CA4YZvB8Ga6k5ZiDoX4tFa
Static task
static1
Behavioral task
behavioral1
Sample
e080e7be4adb375605dbf6afb8852a1c1df2e7cc868d3386a9a0f95edf355c76.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e080e7be4adb375605dbf6afb8852a1c1df2e7cc868d3386a9a0f95edf355c76
-
Size
828KB
-
MD5
ae682f98ec5a045dd6c9a0bc21b088ba
-
SHA1
3877baf0045d6c8d30ea7547c92ed377b943dd0f
-
SHA256
e080e7be4adb375605dbf6afb8852a1c1df2e7cc868d3386a9a0f95edf355c76
-
SHA512
c8a88995bf3931b5c244c4e3ef29552c3ad7ec76e6b7eeb46ee89e755f7486724b59f6f0101ef287c0e3a5c83f43dfaa0800e452c76838e3885e90d8be1d55f6
-
SSDEEP
12288:Yy908w9O9CAW9YZvBp/0GGNfP2TiGdcPn+UGA95ZiDk0V6xEcg58xsdx38etjhpM:YyDwQ9CA4YZvB8Ga6k5ZiDoX4tFa
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1