General
-
Target
0ebd8673174e96dc064cfb896ae8470b1f985f020403aa0032e36ee6529a807a
-
Size
746KB
-
Sample
241111-bx1leszamm
-
MD5
051691e70dc83d1db539e3e0b132c078
-
SHA1
8713979cce86db6b29061be679b49f39dafd3421
-
SHA256
0ebd8673174e96dc064cfb896ae8470b1f985f020403aa0032e36ee6529a807a
-
SHA512
0754005e7eebbabb82fe96f24f1b7bfcddbb35ff55106a8670e67e45b420c21acfe706f047c5717ed0536edd51428365efc5c98a50bd6ad858f68c519ab2c5d0
-
SSDEEP
12288:+y90ZjiWJR0x1rkk50FtU3lIQ+E2Q/459pyBtXCT9+FAUg+BUQ:+yaox550E3KQ+E282CXCTYFAU32Q
Static task
static1
Behavioral task
behavioral1
Sample
0ebd8673174e96dc064cfb896ae8470b1f985f020403aa0032e36ee6529a807a.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
0ebd8673174e96dc064cfb896ae8470b1f985f020403aa0032e36ee6529a807a
-
Size
746KB
-
MD5
051691e70dc83d1db539e3e0b132c078
-
SHA1
8713979cce86db6b29061be679b49f39dafd3421
-
SHA256
0ebd8673174e96dc064cfb896ae8470b1f985f020403aa0032e36ee6529a807a
-
SHA512
0754005e7eebbabb82fe96f24f1b7bfcddbb35ff55106a8670e67e45b420c21acfe706f047c5717ed0536edd51428365efc5c98a50bd6ad858f68c519ab2c5d0
-
SSDEEP
12288:+y90ZjiWJR0x1rkk50FtU3lIQ+E2Q/459pyBtXCT9+FAUg+BUQ:+yaox550E3KQ+E282CXCTYFAU32Q
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1