General
-
Target
4dcfc8863a7b8fe026695bdb5b50d71b0076b2e62e116a3da1ec5e1128be3a42
-
Size
569KB
-
Sample
241110-3nfnfa1jbm
-
MD5
5bf9c95c60bd067724e785611df02c23
-
SHA1
67b99279eff31f45188e346fb0b34b7409af672f
-
SHA256
4dcfc8863a7b8fe026695bdb5b50d71b0076b2e62e116a3da1ec5e1128be3a42
-
SHA512
2b6129444a815870cf5a3df4a32210965d0525fa1cc98f6ed0872438696f6ba1d112b55c5395c69cd21f13acf526e366426cea4c983c9c6536c63bdfaf962bf2
-
SSDEEP
12288:sy90LsuNlQ/8TO5Z6IUiFidxnOY8u0VTV7F0BL1qtlQnQQ:syssuNlQ/Ui2xneuWIRELQ
Static task
static1
Behavioral task
behavioral1
Sample
4dcfc8863a7b8fe026695bdb5b50d71b0076b2e62e116a3da1ec5e1128be3a42.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
4dcfc8863a7b8fe026695bdb5b50d71b0076b2e62e116a3da1ec5e1128be3a42
-
Size
569KB
-
MD5
5bf9c95c60bd067724e785611df02c23
-
SHA1
67b99279eff31f45188e346fb0b34b7409af672f
-
SHA256
4dcfc8863a7b8fe026695bdb5b50d71b0076b2e62e116a3da1ec5e1128be3a42
-
SHA512
2b6129444a815870cf5a3df4a32210965d0525fa1cc98f6ed0872438696f6ba1d112b55c5395c69cd21f13acf526e366426cea4c983c9c6536c63bdfaf962bf2
-
SSDEEP
12288:sy90LsuNlQ/8TO5Z6IUiFidxnOY8u0VTV7F0BL1qtlQnQQ:syssuNlQ/Ui2xneuWIRELQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1