General
-
Target
602ebeddaea5feda009f97a35ebf8ac228c4221870ab4603352a0ab81f6dc132
-
Size
936KB
-
Sample
241110-27kk3awqa1
-
MD5
4834feda478d30d2b9cb89e3f22572f6
-
SHA1
725b8141c446eac49c5978527548162b421c6c1b
-
SHA256
602ebeddaea5feda009f97a35ebf8ac228c4221870ab4603352a0ab81f6dc132
-
SHA512
38245356f6867cd89124a7088c954f65540cc2484653c677776b7d43b093f5f21fee0ff34a7ff90ca7becdf956bc535f980aa4cc699ccd20d43be637e89c79d6
-
SSDEEP
24576:GyFFdQF2FCS6or9VHJ8ZPIXZKmdcSAh4Cw/Sn8IQOGGlwGd:VpTFCQzp8ZlmdcSAJEWnDw
Static task
static1
Behavioral task
behavioral1
Sample
602ebeddaea5feda009f97a35ebf8ac228c4221870ab4603352a0ab81f6dc132.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
602ebeddaea5feda009f97a35ebf8ac228c4221870ab4603352a0ab81f6dc132
-
Size
936KB
-
MD5
4834feda478d30d2b9cb89e3f22572f6
-
SHA1
725b8141c446eac49c5978527548162b421c6c1b
-
SHA256
602ebeddaea5feda009f97a35ebf8ac228c4221870ab4603352a0ab81f6dc132
-
SHA512
38245356f6867cd89124a7088c954f65540cc2484653c677776b7d43b093f5f21fee0ff34a7ff90ca7becdf956bc535f980aa4cc699ccd20d43be637e89c79d6
-
SSDEEP
24576:GyFFdQF2FCS6or9VHJ8ZPIXZKmdcSAh4Cw/Sn8IQOGGlwGd:VpTFCQzp8ZlmdcSAJEWnDw
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1