General
-
Target
5787e2d7d749d11290de99006238d4faf0d6c3ea26db7decb8a55bc553702c4f
-
Size
566KB
-
Sample
241110-3vdsesxkfx
-
MD5
4b4d697b81dbd9feac96da413f03879a
-
SHA1
b07c8b9d8a1eee3a62dbc130eed6eb9cc091801c
-
SHA256
5787e2d7d749d11290de99006238d4faf0d6c3ea26db7decb8a55bc553702c4f
-
SHA512
5c378b1e0f2b1cf022ed7610df7d5de7f3ced0dc8c1131a57e6ff24a3595419b7874d5d8d051b2e999f8cda313bd2b00e4e6f7e383e077f865b4d044f246ab88
-
SSDEEP
12288:3y90QQQMH21jEfFPl1bAKfslANZWAy4g8t:3yir4jEfFN+KElANZWe
Static task
static1
Behavioral task
behavioral1
Sample
5787e2d7d749d11290de99006238d4faf0d6c3ea26db7decb8a55bc553702c4f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5787e2d7d749d11290de99006238d4faf0d6c3ea26db7decb8a55bc553702c4f
-
Size
566KB
-
MD5
4b4d697b81dbd9feac96da413f03879a
-
SHA1
b07c8b9d8a1eee3a62dbc130eed6eb9cc091801c
-
SHA256
5787e2d7d749d11290de99006238d4faf0d6c3ea26db7decb8a55bc553702c4f
-
SHA512
5c378b1e0f2b1cf022ed7610df7d5de7f3ced0dc8c1131a57e6ff24a3595419b7874d5d8d051b2e999f8cda313bd2b00e4e6f7e383e077f865b4d044f246ab88
-
SSDEEP
12288:3y90QQQMH21jEfFPl1bAKfslANZWAy4g8t:3yir4jEfFN+KElANZWe
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1