General
-
Target
4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee
-
Size
563KB
-
Sample
241111-hrsf7awajd
-
MD5
2f877ed8bad79a84e0e0787ad36d04df
-
SHA1
c14ae1944d0559ddb7183eb890c051eb08d6910d
-
SHA256
4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee
-
SHA512
c29e0c426f5722e7419abfbaf16c3c5c792d2ee4d0c3511bde0ec70c99e5583ffde5994e626302f2d3ae1e149c947aa573a693d61baebfc7412dfffaaeeae844
-
SSDEEP
12288:ty90OlkqWBIBVsxE1E9o9wiR5pSXBQ8pX3q2sy:tyvjWusO1LwAPh8pX3z9
Static task
static1
Behavioral task
behavioral1
Sample
4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee
-
Size
563KB
-
MD5
2f877ed8bad79a84e0e0787ad36d04df
-
SHA1
c14ae1944d0559ddb7183eb890c051eb08d6910d
-
SHA256
4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee
-
SHA512
c29e0c426f5722e7419abfbaf16c3c5c792d2ee4d0c3511bde0ec70c99e5583ffde5994e626302f2d3ae1e149c947aa573a693d61baebfc7412dfffaaeeae844
-
SSDEEP
12288:ty90OlkqWBIBVsxE1E9o9wiR5pSXBQ8pX3q2sy:tyvjWusO1LwAPh8pX3z9
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1