General
-
Target
e412d2ee25e4f40ddea5c778d25bcad6cf67eb705e56c8cb6a7055e4956f606f.exe
-
Size
414KB
-
Sample
241118-pvw24sxbpr
-
MD5
12863564382ac3b77f94219c8f51014d
-
SHA1
c70a36c100d875df8301cdf1801ee52a5521e120
-
SHA256
e412d2ee25e4f40ddea5c778d25bcad6cf67eb705e56c8cb6a7055e4956f606f
-
SHA512
0d4c33fb5acd59415592a7eff18ddc275b2690481f95194c082f82c8475325415f3cf59f91daed90b580d462481377cd5ba988057515d8d91430c5cb0b088558
-
SSDEEP
6144:cHp0yN90QE9AJk72DGFt/oJ8LB7PUvuhUACyyjfEpCVehE5vNOcL:dy90zAK7d62Nz4/tjfCgQWv5L
Static task
static1
Behavioral task
behavioral1
Sample
e412d2ee25e4f40ddea5c778d25bcad6cf67eb705e56c8cb6a7055e4956f606f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e412d2ee25e4f40ddea5c778d25bcad6cf67eb705e56c8cb6a7055e4956f606f.exe
-
Size
414KB
-
MD5
12863564382ac3b77f94219c8f51014d
-
SHA1
c70a36c100d875df8301cdf1801ee52a5521e120
-
SHA256
e412d2ee25e4f40ddea5c778d25bcad6cf67eb705e56c8cb6a7055e4956f606f
-
SHA512
0d4c33fb5acd59415592a7eff18ddc275b2690481f95194c082f82c8475325415f3cf59f91daed90b580d462481377cd5ba988057515d8d91430c5cb0b088558
-
SSDEEP
6144:cHp0yN90QE9AJk72DGFt/oJ8LB7PUvuhUACyyjfEpCVehE5vNOcL:dy90zAK7d62Nz4/tjfCgQWv5L
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1