General
-
Target
4fbf5f5a2ecc476ada7dffdf45d62c9d013a62d2dbd28a5b0f6ad439b4355b4a
-
Size
1.1MB
-
Sample
241110-3l2swszrgr
-
MD5
5810577d7b130968c35d15952e143121
-
SHA1
5b2367e4aa546ae0038b72a88a143b89225e8cc5
-
SHA256
4fbf5f5a2ecc476ada7dffdf45d62c9d013a62d2dbd28a5b0f6ad439b4355b4a
-
SHA512
d654e606a6c1ca10dc5031e9468513548e968a83d065cf5a045cafdee852471a0817657fe7fe6dc994329e680b39e5927301f3e440cc35047d63903bb4683443
-
SSDEEP
12288:Ky90mRS0lUW2bbWJw+4nSf2naUcQLRq48+D9ObAFEJ3X3eqIsOuuJvwAdE0M/B+V:Ky1UrW2+FyQ2nVLA4ZDO3X3ePXyVLz0
Static task
static1
Behavioral task
behavioral1
Sample
4fbf5f5a2ecc476ada7dffdf45d62c9d013a62d2dbd28a5b0f6ad439b4355b4a.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
4fbf5f5a2ecc476ada7dffdf45d62c9d013a62d2dbd28a5b0f6ad439b4355b4a
-
Size
1.1MB
-
MD5
5810577d7b130968c35d15952e143121
-
SHA1
5b2367e4aa546ae0038b72a88a143b89225e8cc5
-
SHA256
4fbf5f5a2ecc476ada7dffdf45d62c9d013a62d2dbd28a5b0f6ad439b4355b4a
-
SHA512
d654e606a6c1ca10dc5031e9468513548e968a83d065cf5a045cafdee852471a0817657fe7fe6dc994329e680b39e5927301f3e440cc35047d63903bb4683443
-
SSDEEP
12288:Ky90mRS0lUW2bbWJw+4nSf2naUcQLRq48+D9ObAFEJ3X3eqIsOuuJvwAdE0M/B+V:Ky1UrW2+FyQ2nVLA4ZDO3X3ePXyVLz0
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1