General
-
Target
28efa73359c953a18c5da0833696e0c676926c3e1d39546de85429937e1663b4.exe
-
Size
609KB
-
Sample
241118-1e319s1jhj
-
MD5
a2e455746e4c698862f1bd6a5e8e9094
-
SHA1
5256c00b11d35f27c844a180d3ed5e1be50ef6c7
-
SHA256
28efa73359c953a18c5da0833696e0c676926c3e1d39546de85429937e1663b4
-
SHA512
ef6e2c22dddd8961c34dcb8c48df5d5ddf1f557c210c3f0aa94b63173de186f4c009f3f60b39f4db5bf278ea3c05daf99e89fad6921e3b2a8b7b2c7e2d880685
-
SSDEEP
12288:by90sKTiDDhGqT1Lu2aUQiZjyxBI2KTECcpvrgqXMnbinEhLvOmb:by/Si/hGqT42nQBIS7pjXObkgymb
Static task
static1
Behavioral task
behavioral1
Sample
28efa73359c953a18c5da0833696e0c676926c3e1d39546de85429937e1663b4.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
28efa73359c953a18c5da0833696e0c676926c3e1d39546de85429937e1663b4.exe
-
Size
609KB
-
MD5
a2e455746e4c698862f1bd6a5e8e9094
-
SHA1
5256c00b11d35f27c844a180d3ed5e1be50ef6c7
-
SHA256
28efa73359c953a18c5da0833696e0c676926c3e1d39546de85429937e1663b4
-
SHA512
ef6e2c22dddd8961c34dcb8c48df5d5ddf1f557c210c3f0aa94b63173de186f4c009f3f60b39f4db5bf278ea3c05daf99e89fad6921e3b2a8b7b2c7e2d880685
-
SSDEEP
12288:by90sKTiDDhGqT1Lu2aUQiZjyxBI2KTECcpvrgqXMnbinEhLvOmb:by/Si/hGqT42nQBIS7pjXObkgymb
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1