General
-
Target
868a0d583306e51064828e62fd9aee0988c4972c8aaebe910e550cbb424d2194
-
Size
657KB
-
Sample
241111-bf94jaslfk
-
MD5
54ad03c2a4138850122fadaed6d61a6b
-
SHA1
ecf3a556819e781461ccb48a76845a454664c20f
-
SHA256
868a0d583306e51064828e62fd9aee0988c4972c8aaebe910e550cbb424d2194
-
SHA512
062c9b4d90e2be396b16ac327df151423b03b30af14d1ae710309950f0ba29479c99ee2bbe3c49ac5b05d5e53854c1d7e7aea4f81e9dfc55a556ebb1ce569737
-
SSDEEP
12288:Wy90/HmJ8uC5xeI7guwEP4YyWsNWOVTrihAwgev:WyWGJZCZ7kEP4YARTrvo
Static task
static1
Behavioral task
behavioral1
Sample
868a0d583306e51064828e62fd9aee0988c4972c8aaebe910e550cbb424d2194.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
868a0d583306e51064828e62fd9aee0988c4972c8aaebe910e550cbb424d2194
-
Size
657KB
-
MD5
54ad03c2a4138850122fadaed6d61a6b
-
SHA1
ecf3a556819e781461ccb48a76845a454664c20f
-
SHA256
868a0d583306e51064828e62fd9aee0988c4972c8aaebe910e550cbb424d2194
-
SHA512
062c9b4d90e2be396b16ac327df151423b03b30af14d1ae710309950f0ba29479c99ee2bbe3c49ac5b05d5e53854c1d7e7aea4f81e9dfc55a556ebb1ce569737
-
SSDEEP
12288:Wy90/HmJ8uC5xeI7guwEP4YyWsNWOVTrihAwgev:WyWGJZCZ7kEP4YARTrvo
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1