General
-
Target
fc0c289fc82ca37f50bda976901e6e5f771d6e2ce404360a41fe3b022fd56aa5N.exe
-
Size
470KB
-
Sample
241118-p7ezcsxdpl
-
MD5
ddfae01c73d784b59d7d0e3177dc7ef0
-
SHA1
1df66245f98fc13a65571c8ae3126b82986810c1
-
SHA256
fc0c289fc82ca37f50bda976901e6e5f771d6e2ce404360a41fe3b022fd56aa5
-
SHA512
44732fd908c0e97bfbcb40f3bf95fc2aa22cb41ab8c23d0f9a799ce46b5674dc9e9c3d71b657cb7acef7387a6c37c52fa7f14352d09e481018f33486998e0cc6
-
SSDEEP
12288:oy90XP0yaN89V5O4881ebRog7FRT5f3O:oyzDq9Fa2gDV2
Static task
static1
Behavioral task
behavioral1
Sample
fc0c289fc82ca37f50bda976901e6e5f771d6e2ce404360a41fe3b022fd56aa5N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
fc0c289fc82ca37f50bda976901e6e5f771d6e2ce404360a41fe3b022fd56aa5N.exe
-
Size
470KB
-
MD5
ddfae01c73d784b59d7d0e3177dc7ef0
-
SHA1
1df66245f98fc13a65571c8ae3126b82986810c1
-
SHA256
fc0c289fc82ca37f50bda976901e6e5f771d6e2ce404360a41fe3b022fd56aa5
-
SHA512
44732fd908c0e97bfbcb40f3bf95fc2aa22cb41ab8c23d0f9a799ce46b5674dc9e9c3d71b657cb7acef7387a6c37c52fa7f14352d09e481018f33486998e0cc6
-
SSDEEP
12288:oy90XP0yaN89V5O4881ebRog7FRT5f3O:oyzDq9Fa2gDV2
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1