General
-
Target
61d63238cbc012901e82bd5e26dea34834ad1d53b4e2149db261001e0806b7a4
-
Size
923KB
-
Sample
241110-1tzmdswgkc
-
MD5
019037944cc53a7939accec36caea2e3
-
SHA1
a3c8fe923ed7c4506151f049796e5591ee2dfe3f
-
SHA256
61d63238cbc012901e82bd5e26dea34834ad1d53b4e2149db261001e0806b7a4
-
SHA512
f31c62f9afbe2d2af8dccc52b1d3fc29145f1b310e9fd946e6062ac1849e1eb10dde917d6bf395ca4d577992c932ffb610ed3fc393690e4f90ff84663f628faa
-
SSDEEP
24576:vyFdnxtgtZgFs4yhaIMkWjcu4gbCdHVXw9FZWD8iGTYJDvE/:6DnIoFdhkWjivXw9FZWDJb
Static task
static1
Behavioral task
behavioral1
Sample
61d63238cbc012901e82bd5e26dea34834ad1d53b4e2149db261001e0806b7a4.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
61d63238cbc012901e82bd5e26dea34834ad1d53b4e2149db261001e0806b7a4
-
Size
923KB
-
MD5
019037944cc53a7939accec36caea2e3
-
SHA1
a3c8fe923ed7c4506151f049796e5591ee2dfe3f
-
SHA256
61d63238cbc012901e82bd5e26dea34834ad1d53b4e2149db261001e0806b7a4
-
SHA512
f31c62f9afbe2d2af8dccc52b1d3fc29145f1b310e9fd946e6062ac1849e1eb10dde917d6bf395ca4d577992c932ffb610ed3fc393690e4f90ff84663f628faa
-
SSDEEP
24576:vyFdnxtgtZgFs4yhaIMkWjcu4gbCdHVXw9FZWD8iGTYJDvE/:6DnIoFdhkWjivXw9FZWDJb
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1