General
-
Target
33adc1eba9d5d36738eb9d8f6735d5b7aa1ef6cbf0d400a1727ed552a82a14cf
-
Size
479KB
-
Sample
241110-3mwy2axekl
-
MD5
0be2f0430703c595a0269710c37d209c
-
SHA1
2e70358d2a3d9849e91b29b67d16fcac7184650c
-
SHA256
33adc1eba9d5d36738eb9d8f6735d5b7aa1ef6cbf0d400a1727ed552a82a14cf
-
SHA512
4ee954e8ac9955ac1cdfbb9f35bec939a8c05600d763687e9cedc9f72623b75367f512eea765418b4815f907dd1f8cba738765f83e0f9f3d42f80a65be40269a
-
SSDEEP
12288:GMrDy903bidGCP11dtuwi679Uq8tRvy31+Ts:dy2i4Cr0qkESs
Static task
static1
Behavioral task
behavioral1
Sample
33adc1eba9d5d36738eb9d8f6735d5b7aa1ef6cbf0d400a1727ed552a82a14cf.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
33adc1eba9d5d36738eb9d8f6735d5b7aa1ef6cbf0d400a1727ed552a82a14cf
-
Size
479KB
-
MD5
0be2f0430703c595a0269710c37d209c
-
SHA1
2e70358d2a3d9849e91b29b67d16fcac7184650c
-
SHA256
33adc1eba9d5d36738eb9d8f6735d5b7aa1ef6cbf0d400a1727ed552a82a14cf
-
SHA512
4ee954e8ac9955ac1cdfbb9f35bec939a8c05600d763687e9cedc9f72623b75367f512eea765418b4815f907dd1f8cba738765f83e0f9f3d42f80a65be40269a
-
SSDEEP
12288:GMrDy903bidGCP11dtuwi679Uq8tRvy31+Ts:dy2i4Cr0qkESs
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1