General
-
Target
8e5ebf95005c4cdc504302eedb8f9a3b651e7b023c27fcd1906f7b2d8bf7df50
-
Size
827KB
-
Sample
241110-3rmk6axkax
-
MD5
1e353bac9b7776d8038d00580d209681
-
SHA1
d92ecfa1e7ff16453f1d0ec9eb2203ab691328a8
-
SHA256
8e5ebf95005c4cdc504302eedb8f9a3b651e7b023c27fcd1906f7b2d8bf7df50
-
SHA512
47054b48ca482a120f11a1ce11a87c7991cddf35725bd58877103d3be721ffb97f575de0b6d3c0bd16eaf6d1ca61fde517e9d8017254d6351ff5a26eaa3c2311
-
SSDEEP
12288:Ey90ctuJIh3Z/U6AmeschF1wRXHORqtY/718PTQqKFjO6xoVU7ge9ETlA:EyHvh3Z/U6AmYhF1VlgTbKFjOQM7hA
Static task
static1
Behavioral task
behavioral1
Sample
8e5ebf95005c4cdc504302eedb8f9a3b651e7b023c27fcd1906f7b2d8bf7df50.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8e5ebf95005c4cdc504302eedb8f9a3b651e7b023c27fcd1906f7b2d8bf7df50
-
Size
827KB
-
MD5
1e353bac9b7776d8038d00580d209681
-
SHA1
d92ecfa1e7ff16453f1d0ec9eb2203ab691328a8
-
SHA256
8e5ebf95005c4cdc504302eedb8f9a3b651e7b023c27fcd1906f7b2d8bf7df50
-
SHA512
47054b48ca482a120f11a1ce11a87c7991cddf35725bd58877103d3be721ffb97f575de0b6d3c0bd16eaf6d1ca61fde517e9d8017254d6351ff5a26eaa3c2311
-
SSDEEP
12288:Ey90ctuJIh3Z/U6AmeschF1wRXHORqtY/718PTQqKFjO6xoVU7ge9ETlA:EyHvh3Z/U6AmYhF1VlgTbKFjOQM7hA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1