General
-
Target
32aa53f4249b790e7895a7af2bdacbf9f9e43ca8b7340889834eb0fb64cbc462
-
Size
704KB
-
Sample
241111-c5z6asznfy
-
MD5
d4912c3efc7c6bff26d7429d3dcdedf5
-
SHA1
5026b7e9bc938766b68c15c06249372c9b973928
-
SHA256
32aa53f4249b790e7895a7af2bdacbf9f9e43ca8b7340889834eb0fb64cbc462
-
SHA512
e377fd964000af77cf0178e7c492e3c8e700895d92d9692793ed1488b9c1bcea23d66f46c81df2d8a3f7c64a627b4cae8be12c73df10d23909b4266b732689d6
-
SSDEEP
12288:Uy90M53P81oXB2T9hvGYDmB88fL+3I1fzCjYIzpM6B/KyKIBkaHwM:Uyt3xXkBhOYO88fiCryYIF5xKMkaHN
Static task
static1
Behavioral task
behavioral1
Sample
32aa53f4249b790e7895a7af2bdacbf9f9e43ca8b7340889834eb0fb64cbc462.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
32aa53f4249b790e7895a7af2bdacbf9f9e43ca8b7340889834eb0fb64cbc462
-
Size
704KB
-
MD5
d4912c3efc7c6bff26d7429d3dcdedf5
-
SHA1
5026b7e9bc938766b68c15c06249372c9b973928
-
SHA256
32aa53f4249b790e7895a7af2bdacbf9f9e43ca8b7340889834eb0fb64cbc462
-
SHA512
e377fd964000af77cf0178e7c492e3c8e700895d92d9692793ed1488b9c1bcea23d66f46c81df2d8a3f7c64a627b4cae8be12c73df10d23909b4266b732689d6
-
SSDEEP
12288:Uy90M53P81oXB2T9hvGYDmB88fL+3I1fzCjYIzpM6B/KyKIBkaHwM:Uyt3xXkBhOYO88fiCryYIF5xKMkaHN
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1