General
-
Target
0fa0a2cf33b43f4cf270ce302d240b04404cebb5058d5563e11df641c3998cb7
-
Size
701KB
-
Sample
241111-a7gqmaxrg1
-
MD5
33882310d861b3a8108f2face790183f
-
SHA1
85635172de7f2bb816ae6d82fec54c29a3de00ae
-
SHA256
0fa0a2cf33b43f4cf270ce302d240b04404cebb5058d5563e11df641c3998cb7
-
SHA512
e48401cc0950a86aca8b750c45ed7cf1816a3cf7fd3220866077d0306f10b043c1126b243d5915bdc59de067625629c3dca885548df8c1434c6e05078eb622f0
-
SSDEEP
12288:My90kk5uZJGx34VCskrRsc7kdL0ttmB0EG2jo9wOrVdetxffsxCnBRq4x:MyOT37kdAwGTwmXwXLRNx
Static task
static1
Behavioral task
behavioral1
Sample
0fa0a2cf33b43f4cf270ce302d240b04404cebb5058d5563e11df641c3998cb7.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
0fa0a2cf33b43f4cf270ce302d240b04404cebb5058d5563e11df641c3998cb7
-
Size
701KB
-
MD5
33882310d861b3a8108f2face790183f
-
SHA1
85635172de7f2bb816ae6d82fec54c29a3de00ae
-
SHA256
0fa0a2cf33b43f4cf270ce302d240b04404cebb5058d5563e11df641c3998cb7
-
SHA512
e48401cc0950a86aca8b750c45ed7cf1816a3cf7fd3220866077d0306f10b043c1126b243d5915bdc59de067625629c3dca885548df8c1434c6e05078eb622f0
-
SSDEEP
12288:My90kk5uZJGx34VCskrRsc7kdL0ttmB0EG2jo9wOrVdetxffsxCnBRq4x:MyOT37kdAwGTwmXwXLRNx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1