General
-
Target
1b1f4e058b54db42aa44752c6d35162ffeed28d6395852cea5d818286d042e0d.exe
-
Size
623KB
-
Sample
241110-3bgd7sxfkb
-
MD5
50b4038bcff315ead7110357af847bed
-
SHA1
39718716cb11fe705b508d00f919f1b844da1624
-
SHA256
1b1f4e058b54db42aa44752c6d35162ffeed28d6395852cea5d818286d042e0d
-
SHA512
de08badf708d77958e5fa9dc128273fa77f6bf3e610dcf9f1f5ce0092ed5d471f57f397a94acabd47c3c816e094a8dd945c9f06b858e9645ee678a32896cd4b1
-
SSDEEP
12288:7y90k06ckSdJL3Pg8jLYJGH+K/H2BrfzWM22/isUhS2K3e1z:7yztWJLcJxK/W9fzL2VG0z
Static task
static1
Behavioral task
behavioral1
Sample
1b1f4e058b54db42aa44752c6d35162ffeed28d6395852cea5d818286d042e0d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1b1f4e058b54db42aa44752c6d35162ffeed28d6395852cea5d818286d042e0d.exe
-
Size
623KB
-
MD5
50b4038bcff315ead7110357af847bed
-
SHA1
39718716cb11fe705b508d00f919f1b844da1624
-
SHA256
1b1f4e058b54db42aa44752c6d35162ffeed28d6395852cea5d818286d042e0d
-
SHA512
de08badf708d77958e5fa9dc128273fa77f6bf3e610dcf9f1f5ce0092ed5d471f57f397a94acabd47c3c816e094a8dd945c9f06b858e9645ee678a32896cd4b1
-
SSDEEP
12288:7y90k06ckSdJL3Pg8jLYJGH+K/H2BrfzWM22/isUhS2K3e1z:7yztWJLcJxK/W9fzL2VG0z
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1