General
-
Target
2068c0ad73997c7abc1b9bcde96b6e8ccf8435786f729d9cafeb6903569bcdf7
-
Size
1.3MB
-
Sample
241111-cmc8ta1amh
-
MD5
a73a320ca4658c2d003a6fc843761794
-
SHA1
af52138b8f1c072d91c0fff2e0c3eea30d2ad30a
-
SHA256
2068c0ad73997c7abc1b9bcde96b6e8ccf8435786f729d9cafeb6903569bcdf7
-
SHA512
8f7529c65c438a98c3805ba75748f659a53a46cb2bd68aea740629efcb921d0f6ff6914f44681c5870f077259021e5fb672d0caa665db03fac1aca4164f79035
-
SSDEEP
24576:Ry758EE+uHSUB5mg+5rJT3gugZ1xV6QnNohmS2:E/ruyUB5mg+5NUugxNohf
Static task
static1
Behavioral task
behavioral1
Sample
2068c0ad73997c7abc1b9bcde96b6e8ccf8435786f729d9cafeb6903569bcdf7.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2068c0ad73997c7abc1b9bcde96b6e8ccf8435786f729d9cafeb6903569bcdf7
-
Size
1.3MB
-
MD5
a73a320ca4658c2d003a6fc843761794
-
SHA1
af52138b8f1c072d91c0fff2e0c3eea30d2ad30a
-
SHA256
2068c0ad73997c7abc1b9bcde96b6e8ccf8435786f729d9cafeb6903569bcdf7
-
SHA512
8f7529c65c438a98c3805ba75748f659a53a46cb2bd68aea740629efcb921d0f6ff6914f44681c5870f077259021e5fb672d0caa665db03fac1aca4164f79035
-
SSDEEP
24576:Ry758EE+uHSUB5mg+5rJT3gugZ1xV6QnNohmS2:E/ruyUB5mg+5NUugxNohf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1