General
-
Target
4ab0e74dd65abe2842502a67701f1134d79d16a4936b4b35ba909bd21e0cb970
-
Size
560KB
-
Sample
241110-3mfl2sxgmg
-
MD5
c6abe1304ab7b48eacf2a9e294d0a1ab
-
SHA1
0893d437993a77a97cbeb5fd4d4d3760eb685221
-
SHA256
4ab0e74dd65abe2842502a67701f1134d79d16a4936b4b35ba909bd21e0cb970
-
SHA512
31a7d36951896c6495e292acc404ba41773a26563b71db4dfa539212622503f28b8d9bb4726a1f60427ade5a3fdd2a8750b18840795f5a40ae07f19bd2c77fff
-
SSDEEP
12288:ay90iDVQ3jNOqI0QUa0n0rph5llFT/1BVudVJCgdlGfpkrOJIl:ayF+jNzI0/nujpjM261
Static task
static1
Behavioral task
behavioral1
Sample
4ab0e74dd65abe2842502a67701f1134d79d16a4936b4b35ba909bd21e0cb970.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
4ab0e74dd65abe2842502a67701f1134d79d16a4936b4b35ba909bd21e0cb970
-
Size
560KB
-
MD5
c6abe1304ab7b48eacf2a9e294d0a1ab
-
SHA1
0893d437993a77a97cbeb5fd4d4d3760eb685221
-
SHA256
4ab0e74dd65abe2842502a67701f1134d79d16a4936b4b35ba909bd21e0cb970
-
SHA512
31a7d36951896c6495e292acc404ba41773a26563b71db4dfa539212622503f28b8d9bb4726a1f60427ade5a3fdd2a8750b18840795f5a40ae07f19bd2c77fff
-
SSDEEP
12288:ay90iDVQ3jNOqI0QUa0n0rph5llFT/1BVudVJCgdlGfpkrOJIl:ayF+jNzI0/nujpjM261
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1