General
-
Target
4eaa1e68786b66ed7c211f185ae70f7dec7645cb6778c558041d433d274e0eec.exe
-
Size
623KB
-
Sample
241118-tv528s1brk
-
MD5
8125adc4ee008d552b18a34b4e3370e9
-
SHA1
4a01c26eb22fe95735fd1b3250f1fe72fd24ea23
-
SHA256
4eaa1e68786b66ed7c211f185ae70f7dec7645cb6778c558041d433d274e0eec
-
SHA512
b04f12f8ec4fb3c97efa75e5b7c79baf5412ef1f83ab3c8c490ba088c5c6c5c57722630aeef899f232c38c2aaf4da6db9379ce9878b416cefec37d5e038a5e6d
-
SSDEEP
12288:By90NNpOOQhSVtnfZR+94t781LKoZDpOUkmRfXrO5R6P:ByM6Oy1KoZVhqR6P
Static task
static1
Behavioral task
behavioral1
Sample
4eaa1e68786b66ed7c211f185ae70f7dec7645cb6778c558041d433d274e0eec.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
4eaa1e68786b66ed7c211f185ae70f7dec7645cb6778c558041d433d274e0eec.exe
-
Size
623KB
-
MD5
8125adc4ee008d552b18a34b4e3370e9
-
SHA1
4a01c26eb22fe95735fd1b3250f1fe72fd24ea23
-
SHA256
4eaa1e68786b66ed7c211f185ae70f7dec7645cb6778c558041d433d274e0eec
-
SHA512
b04f12f8ec4fb3c97efa75e5b7c79baf5412ef1f83ab3c8c490ba088c5c6c5c57722630aeef899f232c38c2aaf4da6db9379ce9878b416cefec37d5e038a5e6d
-
SSDEEP
12288:By90NNpOOQhSVtnfZR+94t781LKoZDpOUkmRfXrO5R6P:ByM6Oy1KoZVhqR6P
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1