General
-
Target
d4c479fe5bd2ea0a69367aeaffce35b2562447e8f9928cfb4a31f1d7bee518da
-
Size
560KB
-
Sample
241110-3tnw1a1kcr
-
MD5
62b001deca80506561d0e74c557a7b02
-
SHA1
bf02f17d73ad0713ef365397e321d474ca7a7e49
-
SHA256
d4c479fe5bd2ea0a69367aeaffce35b2562447e8f9928cfb4a31f1d7bee518da
-
SHA512
615aff6f15c8709ef772cca52c1418dbb2409c2da7ca2a58b3667693ff0b84b56fdc5f1927f0bee43dabd6eacf9b7aa08077f47d19e36a6db51271eaf409340f
-
SSDEEP
12288:3y904tLt5yMnUBhRiRm+T2uAy8u9SbsC0awHBDmiNwOIvat:3yrtLt5yyUB8d2u98HbFwhDmYzIit
Static task
static1
Behavioral task
behavioral1
Sample
d4c479fe5bd2ea0a69367aeaffce35b2562447e8f9928cfb4a31f1d7bee518da.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d4c479fe5bd2ea0a69367aeaffce35b2562447e8f9928cfb4a31f1d7bee518da
-
Size
560KB
-
MD5
62b001deca80506561d0e74c557a7b02
-
SHA1
bf02f17d73ad0713ef365397e321d474ca7a7e49
-
SHA256
d4c479fe5bd2ea0a69367aeaffce35b2562447e8f9928cfb4a31f1d7bee518da
-
SHA512
615aff6f15c8709ef772cca52c1418dbb2409c2da7ca2a58b3667693ff0b84b56fdc5f1927f0bee43dabd6eacf9b7aa08077f47d19e36a6db51271eaf409340f
-
SSDEEP
12288:3y904tLt5yMnUBhRiRm+T2uAy8u9SbsC0awHBDmiNwOIvat:3yrtLt5yyUB8d2u98HbFwhDmYzIit
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1