General
-
Target
30e2deda450cb395e18a5f16cdc96a9b7ee4469b98ceafd65587ad6807c2d4d5.exe
-
Size
610KB
-
Sample
241118-rsplcsyerr
-
MD5
2a94bc63f69140ba9d248704616306bd
-
SHA1
63cfbd7a2367f6b98f8f4cb98cfb52aa8ffa3c4a
-
SHA256
30e2deda450cb395e18a5f16cdc96a9b7ee4469b98ceafd65587ad6807c2d4d5
-
SHA512
1080062be29296296f081616e1b4f57d6f065baa4a8f868e016df7b419e13f32358c959821ca69dfd69348eda63a0ee731a91c2d6ffddd7ac383d2401c5f43f5
-
SSDEEP
12288:Jy90c6k/YvOboajMsaiRzhkdkG2rgIXYiIRbRxo3K9ZDmOCSELA:JySOBb7kdkG5/RbRxeK9ZDOA
Static task
static1
Behavioral task
behavioral1
Sample
30e2deda450cb395e18a5f16cdc96a9b7ee4469b98ceafd65587ad6807c2d4d5.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
30e2deda450cb395e18a5f16cdc96a9b7ee4469b98ceafd65587ad6807c2d4d5.exe
-
Size
610KB
-
MD5
2a94bc63f69140ba9d248704616306bd
-
SHA1
63cfbd7a2367f6b98f8f4cb98cfb52aa8ffa3c4a
-
SHA256
30e2deda450cb395e18a5f16cdc96a9b7ee4469b98ceafd65587ad6807c2d4d5
-
SHA512
1080062be29296296f081616e1b4f57d6f065baa4a8f868e016df7b419e13f32358c959821ca69dfd69348eda63a0ee731a91c2d6ffddd7ac383d2401c5f43f5
-
SSDEEP
12288:Jy90c6k/YvOboajMsaiRzhkdkG2rgIXYiIRbRxo3K9ZDmOCSELA:JySOBb7kdkG5/RbRxeK9ZDOA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1