General
-
Target
b41eac15a261446b8d6882d742836798ccd54729e5a7e5f63364b224bff85ea9
-
Size
694KB
-
Sample
241111-cflavayrex
-
MD5
18f6b14e6924c4d658b6b7c7c915309d
-
SHA1
dd4cdb247a94bb462adb7a92303be2b82ee564ab
-
SHA256
b41eac15a261446b8d6882d742836798ccd54729e5a7e5f63364b224bff85ea9
-
SHA512
f261caf269ba568e9043d5a00146169e8a923b140e2713339ad3afcd942c801a94d59445787cf4485b57e197eca8a5aad693e60a818167205076baea240e932f
-
SSDEEP
12288:0y90SphN71O1DvpNr8r1MoZRsFADeP/oJcNU0ttHHVYEeZWtfd6/:0yDpn71OZvpZ8rlujPRbVGAlY
Static task
static1
Behavioral task
behavioral1
Sample
b41eac15a261446b8d6882d742836798ccd54729e5a7e5f63364b224bff85ea9.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b41eac15a261446b8d6882d742836798ccd54729e5a7e5f63364b224bff85ea9
-
Size
694KB
-
MD5
18f6b14e6924c4d658b6b7c7c915309d
-
SHA1
dd4cdb247a94bb462adb7a92303be2b82ee564ab
-
SHA256
b41eac15a261446b8d6882d742836798ccd54729e5a7e5f63364b224bff85ea9
-
SHA512
f261caf269ba568e9043d5a00146169e8a923b140e2713339ad3afcd942c801a94d59445787cf4485b57e197eca8a5aad693e60a818167205076baea240e932f
-
SSDEEP
12288:0y90SphN71O1DvpNr8r1MoZRsFADeP/oJcNU0ttHHVYEeZWtfd6/:0yDpn71OZvpZ8rlujPRbVGAlY
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1