General
-
Target
8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863
-
Size
569KB
-
Sample
241111-bvfs8sspam
-
MD5
8f2e828c45134e5b177d1c8f6bfb61c5
-
SHA1
e46ffdeb49f7970a64854af1e652a2c006b5df04
-
SHA256
8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863
-
SHA512
fac8907899f6b56bb4f9f8e0b4262d7ef551e7cb1539fa5702d72a00677f4a3206f7d7635494356bf85cf418a41cd8e54e04cf743c5d1b57cc6effb9256ce089
-
SSDEEP
12288:/y90MvQf6uDS53L2T9EUTKGdrnUY8d0F3INwHYCzq7hUD:/yEEb2JjTHrnMdeZD
Static task
static1
Behavioral task
behavioral1
Sample
8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863
-
Size
569KB
-
MD5
8f2e828c45134e5b177d1c8f6bfb61c5
-
SHA1
e46ffdeb49f7970a64854af1e652a2c006b5df04
-
SHA256
8a29a9b9163722c42af5469750607fc474c7d725315c8fa356efc49a31722863
-
SHA512
fac8907899f6b56bb4f9f8e0b4262d7ef551e7cb1539fa5702d72a00677f4a3206f7d7635494356bf85cf418a41cd8e54e04cf743c5d1b57cc6effb9256ce089
-
SSDEEP
12288:/y90MvQf6uDS53L2T9EUTKGdrnUY8d0F3INwHYCzq7hUD:/yEEb2JjTHrnMdeZD
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1