General
-
Target
b5ede35155760e86df0fd4acefc31af4d64ec01d06f7e51ceabc723fb8174e5eN.exe
-
Size
609KB
-
Sample
241118-sy3kvazapd
-
MD5
33fc42157beacfc23300526e8c0bfd70
-
SHA1
c2442cbfd6d06c367571813b1e49f124ab921d08
-
SHA256
b5ede35155760e86df0fd4acefc31af4d64ec01d06f7e51ceabc723fb8174e5e
-
SHA512
a1e08138f325f3d78b53c2ee5897a7566fab75e6ef3d721539db1338aedcce8a12d0eed8c37a588fd835acf9d0c948b1d2684b2539f616f68f6599403ef25769
-
SSDEEP
12288:by90sKTiDDhGqT1Lu2aUQiZjyxBI2KTECcpvrgqXMnbinEhLvOm:by/Si/hGqT42nQBIS7pjXObkgym
Static task
static1
Behavioral task
behavioral1
Sample
b5ede35155760e86df0fd4acefc31af4d64ec01d06f7e51ceabc723fb8174e5eN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b5ede35155760e86df0fd4acefc31af4d64ec01d06f7e51ceabc723fb8174e5eN.exe
-
Size
609KB
-
MD5
33fc42157beacfc23300526e8c0bfd70
-
SHA1
c2442cbfd6d06c367571813b1e49f124ab921d08
-
SHA256
b5ede35155760e86df0fd4acefc31af4d64ec01d06f7e51ceabc723fb8174e5e
-
SHA512
a1e08138f325f3d78b53c2ee5897a7566fab75e6ef3d721539db1338aedcce8a12d0eed8c37a588fd835acf9d0c948b1d2684b2539f616f68f6599403ef25769
-
SSDEEP
12288:by90sKTiDDhGqT1Lu2aUQiZjyxBI2KTECcpvrgqXMnbinEhLvOm:by/Si/hGqT42nQBIS7pjXObkgym
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1