General
-
Target
618e579cc9f18ffd422223143ad52a7421b978570cb639230136a466e4980b5fN
-
Size
469KB
-
Sample
241110-2cre5awgnj
-
MD5
4bd9b1c62f8de9e1015fd50f757c2200
-
SHA1
a175ce0c3c7889cb3e8bfe24f40e37d4a8f2cc01
-
SHA256
618e579cc9f18ffd422223143ad52a7421b978570cb639230136a466e4980b5f
-
SHA512
a9262d2f161885f5d4edee8314b82111bc582b0e47c5b3d64fbfebb8563765e49c89151f7f2daa5a2d28e770446180f4c7000e80db311fb8804f233fb0cc1328
-
SSDEEP
12288:By90fTrqg0Al09gCcOXu9WY2aDLMFSxg1DLZ0j:ByGXlHvT9WY2Mg1e
Static task
static1
Behavioral task
behavioral1
Sample
618e579cc9f18ffd422223143ad52a7421b978570cb639230136a466e4980b5fN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
618e579cc9f18ffd422223143ad52a7421b978570cb639230136a466e4980b5fN
-
Size
469KB
-
MD5
4bd9b1c62f8de9e1015fd50f757c2200
-
SHA1
a175ce0c3c7889cb3e8bfe24f40e37d4a8f2cc01
-
SHA256
618e579cc9f18ffd422223143ad52a7421b978570cb639230136a466e4980b5f
-
SHA512
a9262d2f161885f5d4edee8314b82111bc582b0e47c5b3d64fbfebb8563765e49c89151f7f2daa5a2d28e770446180f4c7000e80db311fb8804f233fb0cc1328
-
SSDEEP
12288:By90fTrqg0Al09gCcOXu9WY2aDLMFSxg1DLZ0j:ByGXlHvT9WY2Mg1e
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1