General
-
Target
f64dfd83c8fc1907ec2bdcd894226f6dcf3a515e05f8291c5574b124f43bbe7a.exe
-
Size
470KB
-
Sample
241118-m7m9mazpdp
-
MD5
267b7dac77e6d3cacb37f6152bce9239
-
SHA1
637aa220be64148ea4d4c953a44c4f20d2307f98
-
SHA256
f64dfd83c8fc1907ec2bdcd894226f6dcf3a515e05f8291c5574b124f43bbe7a
-
SHA512
4cd78c5913ffc97ac509f7641513af6849acea25cff9ed97d6084f38412d1e35680fb4e4ac706382b172820c2516921600a81026830a4a2b81498327a71de9f6
-
SSDEEP
6144:vYp0yN90QEB9oSbF8jDwEF1P52gN9RyiqGOYMnRvBUzxac1gmtMER3u0gMa3I638:xy9071FmP52gNTMnnsMEhu53jsf
Static task
static1
Behavioral task
behavioral1
Sample
f64dfd83c8fc1907ec2bdcd894226f6dcf3a515e05f8291c5574b124f43bbe7a.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f64dfd83c8fc1907ec2bdcd894226f6dcf3a515e05f8291c5574b124f43bbe7a.exe
-
Size
470KB
-
MD5
267b7dac77e6d3cacb37f6152bce9239
-
SHA1
637aa220be64148ea4d4c953a44c4f20d2307f98
-
SHA256
f64dfd83c8fc1907ec2bdcd894226f6dcf3a515e05f8291c5574b124f43bbe7a
-
SHA512
4cd78c5913ffc97ac509f7641513af6849acea25cff9ed97d6084f38412d1e35680fb4e4ac706382b172820c2516921600a81026830a4a2b81498327a71de9f6
-
SSDEEP
6144:vYp0yN90QEB9oSbF8jDwEF1P52gN9RyiqGOYMnRvBUzxac1gmtMER3u0gMa3I638:xy9071FmP52gNTMnnsMEhu53jsf
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1