General
-
Target
487da0f3f445ec10028d7414895ad01e4f28d2fecf8c93e5c78104e21e3880e3.exe
-
Size
469KB
-
Sample
241118-phnj7swlf1
-
MD5
53963f35dcfa9c2853e6f746c1ccb440
-
SHA1
53dd0f63f31225e2991da068b94e853bae30ac84
-
SHA256
487da0f3f445ec10028d7414895ad01e4f28d2fecf8c93e5c78104e21e3880e3
-
SHA512
27380de64fdb66c6450b039714ed2a1e90403ea83cf9dae27c7d29fe51aecd57c603fed5559a958933852224775c60d76167a195c0c568708e19ebea60f6f6d7
-
SSDEEP
12288:zy90/5gFJhdkDcsDYjQkmyZ3KaM5SHxE++y:zy25g92xkfZaBSRqy
Static task
static1
Behavioral task
behavioral1
Sample
487da0f3f445ec10028d7414895ad01e4f28d2fecf8c93e5c78104e21e3880e3.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
487da0f3f445ec10028d7414895ad01e4f28d2fecf8c93e5c78104e21e3880e3.exe
-
Size
469KB
-
MD5
53963f35dcfa9c2853e6f746c1ccb440
-
SHA1
53dd0f63f31225e2991da068b94e853bae30ac84
-
SHA256
487da0f3f445ec10028d7414895ad01e4f28d2fecf8c93e5c78104e21e3880e3
-
SHA512
27380de64fdb66c6450b039714ed2a1e90403ea83cf9dae27c7d29fe51aecd57c603fed5559a958933852224775c60d76167a195c0c568708e19ebea60f6f6d7
-
SSDEEP
12288:zy90/5gFJhdkDcsDYjQkmyZ3KaM5SHxE++y:zy25g92xkfZaBSRqy
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1