General
-
Target
2bd180a8ebc0ea64043abebe13d82232e3f8ae14caf4c931d2cf21ab05d24b05
-
Size
560KB
-
Sample
241110-1wmqlswgna
-
MD5
e84cb4f762f022e87599173899a29d39
-
SHA1
e7fd10880ea9057ba76bf3c68b86aaf6155b6905
-
SHA256
2bd180a8ebc0ea64043abebe13d82232e3f8ae14caf4c931d2cf21ab05d24b05
-
SHA512
b7239ec7602b07c8c33eca633901242a87a2a3a9a7556d8590ddecacbaa99c33cbdd1dbf09a1c08e8f998c5d902a5d050fd43171a8f5da6b62d6da2529eb0a90
-
SSDEEP
12288:iy90hRcxQMQIvrxK16Fkzv2ZphuoZFTr1BxudVJ8ODcXf:iy0OvpEOx99jjMcP
Static task
static1
Behavioral task
behavioral1
Sample
2bd180a8ebc0ea64043abebe13d82232e3f8ae14caf4c931d2cf21ab05d24b05.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2bd180a8ebc0ea64043abebe13d82232e3f8ae14caf4c931d2cf21ab05d24b05
-
Size
560KB
-
MD5
e84cb4f762f022e87599173899a29d39
-
SHA1
e7fd10880ea9057ba76bf3c68b86aaf6155b6905
-
SHA256
2bd180a8ebc0ea64043abebe13d82232e3f8ae14caf4c931d2cf21ab05d24b05
-
SHA512
b7239ec7602b07c8c33eca633901242a87a2a3a9a7556d8590ddecacbaa99c33cbdd1dbf09a1c08e8f998c5d902a5d050fd43171a8f5da6b62d6da2529eb0a90
-
SSDEEP
12288:iy90hRcxQMQIvrxK16Fkzv2ZphuoZFTr1BxudVJ8ODcXf:iy0OvpEOx99jjMcP
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1