General
-
Target
ab1bcfe4042110c5bbade0476101fce2c8dbfb25343fc1ce1315b293b328c756
-
Size
568KB
-
Sample
241110-2afkvaxbke
-
MD5
25b203d61ce77a41106e04e6361b3f21
-
SHA1
4a30b0d1e27848c8ee6e3f033e5bcc24166ff1a8
-
SHA256
ab1bcfe4042110c5bbade0476101fce2c8dbfb25343fc1ce1315b293b328c756
-
SHA512
fcaee48b3f0721bb021ee4968a6f0ff830ab2ae036bd029fe03d30b4dd5c82618c9c07d41e0488ceabbd80263b1efc4a0eaa038dcb2ed23a657e24a4a09512c1
-
SSDEEP
12288:7y90FOoGRdwBYw+vwM2KOhFRjXZtRhvrHch29WF:7yQOXzw5KOZFhHm
Static task
static1
Behavioral task
behavioral1
Sample
ab1bcfe4042110c5bbade0476101fce2c8dbfb25343fc1ce1315b293b328c756.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ab1bcfe4042110c5bbade0476101fce2c8dbfb25343fc1ce1315b293b328c756
-
Size
568KB
-
MD5
25b203d61ce77a41106e04e6361b3f21
-
SHA1
4a30b0d1e27848c8ee6e3f033e5bcc24166ff1a8
-
SHA256
ab1bcfe4042110c5bbade0476101fce2c8dbfb25343fc1ce1315b293b328c756
-
SHA512
fcaee48b3f0721bb021ee4968a6f0ff830ab2ae036bd029fe03d30b4dd5c82618c9c07d41e0488ceabbd80263b1efc4a0eaa038dcb2ed23a657e24a4a09512c1
-
SSDEEP
12288:7y90FOoGRdwBYw+vwM2KOhFRjXZtRhvrHch29WF:7yQOXzw5KOZFhHm
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1