General
-
Target
c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36.exe
-
Size
548KB
-
Sample
241110-1pr2rawfjh
-
MD5
422165c26877fde9e5f0ad64b258d52b
-
SHA1
f61357faa2cc9df88fe7b5fc009ff0126479c372
-
SHA256
c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36
-
SHA512
86a17cc7c630a36d9e272c95ab18049c6f248c94a509c0b7a300dcc29efe157a63f96f7099bc49074ca8dfda2bc10098f737d0413e6f5716ba0af8809a37d1e6
-
SSDEEP
12288:dy90mB3nQylD15zzZc2x/SRZX0WFS0rheabiG70f7:dyZ3hBPzZc2x/SRZkWvQXLf7
Static task
static1
Behavioral task
behavioral1
Sample
c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36.exe
-
Size
548KB
-
MD5
422165c26877fde9e5f0ad64b258d52b
-
SHA1
f61357faa2cc9df88fe7b5fc009ff0126479c372
-
SHA256
c375fe2388d57a533c75ebbdb955a305f6965b42ddd0605857562eb8115bba36
-
SHA512
86a17cc7c630a36d9e272c95ab18049c6f248c94a509c0b7a300dcc29efe157a63f96f7099bc49074ca8dfda2bc10098f737d0413e6f5716ba0af8809a37d1e6
-
SSDEEP
12288:dy90mB3nQylD15zzZc2x/SRZX0WFS0rheabiG70f7:dyZ3hBPzZc2x/SRZkWvQXLf7
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1