General
-
Target
c2e69bd553ecc99027229065338785fb773ff3f64311e38d87f5610fc36a5008
-
Size
1.5MB
-
Sample
241111-a4twsasjaq
-
MD5
d049e72de6a7279e743864f0859fb029
-
SHA1
ef2905b40abace3bdbfdcacddc2b4afd6fa1dce6
-
SHA256
c2e69bd553ecc99027229065338785fb773ff3f64311e38d87f5610fc36a5008
-
SHA512
62240844d3b89b8757dbca4e329bb833cca01ade9374cf3661b6d8a51aeeda4f65ad5c85318d7e92221adf52af3c6998a6f1c1a407ab2c3a4ec29145013508e0
-
SSDEEP
49152:Ps+WdTRAnJSIgICl9VFk0SACHlUpGKfcm:Vuyn9JoFLSAMmpffz
Static task
static1
Behavioral task
behavioral1
Sample
c2e69bd553ecc99027229065338785fb773ff3f64311e38d87f5610fc36a5008.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c2e69bd553ecc99027229065338785fb773ff3f64311e38d87f5610fc36a5008
-
Size
1.5MB
-
MD5
d049e72de6a7279e743864f0859fb029
-
SHA1
ef2905b40abace3bdbfdcacddc2b4afd6fa1dce6
-
SHA256
c2e69bd553ecc99027229065338785fb773ff3f64311e38d87f5610fc36a5008
-
SHA512
62240844d3b89b8757dbca4e329bb833cca01ade9374cf3661b6d8a51aeeda4f65ad5c85318d7e92221adf52af3c6998a6f1c1a407ab2c3a4ec29145013508e0
-
SSDEEP
49152:Ps+WdTRAnJSIgICl9VFk0SACHlUpGKfcm:Vuyn9JoFLSAMmpffz
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1