General
-
Target
6fda567e8623758be1f33418caf251559ca83938a0d8b737881a542943efe515
-
Size
560KB
-
Sample
241110-3rtdps1jhq
-
MD5
bba09803944d955683b33958ec1fc6b8
-
SHA1
c2d1edf6b1b880726ff04dd6a448f11ba384bcd3
-
SHA256
6fda567e8623758be1f33418caf251559ca83938a0d8b737881a542943efe515
-
SHA512
a5526322d6acfe1e6908962fabecfaa50c8483e362f1fc7dd2f71f7f379851c86bcd7a4353c3245c82ef7310b7985064d9dfd77a08f41cce7691c6dfe41ee513
-
SSDEEP
12288:Ly90X6WxvBnw0Krkpu01kKWupOyiGfaLCX9Xw0KDoOe5:LyMTqrkpugk4NHfa2zKDoO2
Static task
static1
Behavioral task
behavioral1
Sample
6fda567e8623758be1f33418caf251559ca83938a0d8b737881a542943efe515.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6fda567e8623758be1f33418caf251559ca83938a0d8b737881a542943efe515
-
Size
560KB
-
MD5
bba09803944d955683b33958ec1fc6b8
-
SHA1
c2d1edf6b1b880726ff04dd6a448f11ba384bcd3
-
SHA256
6fda567e8623758be1f33418caf251559ca83938a0d8b737881a542943efe515
-
SHA512
a5526322d6acfe1e6908962fabecfaa50c8483e362f1fc7dd2f71f7f379851c86bcd7a4353c3245c82ef7310b7985064d9dfd77a08f41cce7691c6dfe41ee513
-
SSDEEP
12288:Ly90X6WxvBnw0Krkpu01kKWupOyiGfaLCX9Xw0KDoOe5:LyMTqrkpugk4NHfa2zKDoO2
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1