General
-
Target
82cfacbd9b55025c13cfb4db72e1675b3509b0a48408f7ea33f49345ba318d39
-
Size
701KB
-
Sample
241110-3qpn5axepm
-
MD5
378721a977eeaf8a36c7162acb692163
-
SHA1
852282d6635467354880c7a12c6f43691d500bb7
-
SHA256
82cfacbd9b55025c13cfb4db72e1675b3509b0a48408f7ea33f49345ba318d39
-
SHA512
eed2bf0569c3f5afebf5331276ac21f0f74ebbf085efca6b22e0961d63360ab750568c618a939c79a308c59d598fc998922eafcc45b053bd08e99dbaf8ec5bad
-
SSDEEP
12288:Ty90CQuICg4JU/c0WWrOMqYxee75tNtGMiJqhnRsBCFNOIbwv+eo:TyhjgZU0WWrFVAahnRsBCF/bwv+b
Static task
static1
Behavioral task
behavioral1
Sample
82cfacbd9b55025c13cfb4db72e1675b3509b0a48408f7ea33f49345ba318d39.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
82cfacbd9b55025c13cfb4db72e1675b3509b0a48408f7ea33f49345ba318d39
-
Size
701KB
-
MD5
378721a977eeaf8a36c7162acb692163
-
SHA1
852282d6635467354880c7a12c6f43691d500bb7
-
SHA256
82cfacbd9b55025c13cfb4db72e1675b3509b0a48408f7ea33f49345ba318d39
-
SHA512
eed2bf0569c3f5afebf5331276ac21f0f74ebbf085efca6b22e0961d63360ab750568c618a939c79a308c59d598fc998922eafcc45b053bd08e99dbaf8ec5bad
-
SSDEEP
12288:Ty90CQuICg4JU/c0WWrOMqYxee75tNtGMiJqhnRsBCFNOIbwv+eo:TyhjgZU0WWrFVAahnRsBCF/bwv+b
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1