General
-
Target
ed3ac1c9a169bd6a53851255e85be724877ac0d852d45e492cdc4be2065eba02
-
Size
919KB
-
Sample
241110-3s93va1kcl
-
MD5
628ba8d59aede89f1c7023879cb72742
-
SHA1
43ea9b3770d9ca7d353719aa2475a3e53bd7c66f
-
SHA256
ed3ac1c9a169bd6a53851255e85be724877ac0d852d45e492cdc4be2065eba02
-
SHA512
d31b6f6eae4e830599f299d5b9bb9c8e25204250b884cf30ea68e027abd00a52fd4345eddaa5e45b60670ecb97efdc4c2ede57364a6b9af75cb0002265fced88
-
SSDEEP
24576:kyDYiyaTmrO2mre+hgk/wJ11sND6PUFkRr5:zEiyaai29pjFM
Static task
static1
Behavioral task
behavioral1
Sample
ed3ac1c9a169bd6a53851255e85be724877ac0d852d45e492cdc4be2065eba02.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ed3ac1c9a169bd6a53851255e85be724877ac0d852d45e492cdc4be2065eba02
-
Size
919KB
-
MD5
628ba8d59aede89f1c7023879cb72742
-
SHA1
43ea9b3770d9ca7d353719aa2475a3e53bd7c66f
-
SHA256
ed3ac1c9a169bd6a53851255e85be724877ac0d852d45e492cdc4be2065eba02
-
SHA512
d31b6f6eae4e830599f299d5b9bb9c8e25204250b884cf30ea68e027abd00a52fd4345eddaa5e45b60670ecb97efdc4c2ede57364a6b9af75cb0002265fced88
-
SSDEEP
24576:kyDYiyaTmrO2mre+hgk/wJ11sND6PUFkRr5:zEiyaai29pjFM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1