General
-
Target
816c33438ad548f6098137aa1e1f938d21eb91c6e94446ab98531e411a6206d0
-
Size
542KB
-
Sample
241114-3mv2qsvfrr
-
MD5
a6383dfde63c9321c01f212a57e80901
-
SHA1
762f319754bf38891b4efe957d93cd3fa0ec0a3b
-
SHA256
816c33438ad548f6098137aa1e1f938d21eb91c6e94446ab98531e411a6206d0
-
SHA512
83a20a32176b0049ff286730e7efd1ef6002e912731957f0f66e47872fb1c265749267a22ffe88b4d30546308b52f5f98540036c232126eb2f44f0094d47bc96
-
SSDEEP
12288:6y90ukkG1jrzbfQ2IeTu/Ull25Qm7ImdlyYt8Wh:6yK13zCeTZlOt7mwv
Static task
static1
Behavioral task
behavioral1
Sample
816c33438ad548f6098137aa1e1f938d21eb91c6e94446ab98531e411a6206d0.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
816c33438ad548f6098137aa1e1f938d21eb91c6e94446ab98531e411a6206d0
-
Size
542KB
-
MD5
a6383dfde63c9321c01f212a57e80901
-
SHA1
762f319754bf38891b4efe957d93cd3fa0ec0a3b
-
SHA256
816c33438ad548f6098137aa1e1f938d21eb91c6e94446ab98531e411a6206d0
-
SHA512
83a20a32176b0049ff286730e7efd1ef6002e912731957f0f66e47872fb1c265749267a22ffe88b4d30546308b52f5f98540036c232126eb2f44f0094d47bc96
-
SSDEEP
12288:6y90ukkG1jrzbfQ2IeTu/Ull25Qm7ImdlyYt8Wh:6yK13zCeTZlOt7mwv
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1