General
-
Target
1ed21fff70401a3d2fa8c72965b825594c4158d24fa7e73b390b2fd98ea1bf7fN.exe
-
Size
610KB
-
Sample
241118-vg7vcawkcq
-
MD5
640c9b831da24047f5bd793949464220
-
SHA1
835e4b82343b7aa9989361dd9136c4d61b1fc17a
-
SHA256
1ed21fff70401a3d2fa8c72965b825594c4158d24fa7e73b390b2fd98ea1bf7f
-
SHA512
fd53f198325232a1895509f18d50641b07c2c185ee3d7e6c21a9a308bee770f338033250e6b943bbeccc23fcca9ac2c176e37eb2d888e7eeec495934ac0e57fd
-
SSDEEP
12288:Py90slz1fACEBre8hMqPOGMv5Fsh+TrG6iwDi3Vbk3K9ZDKOCoN:PyLxforXmZXsx6ix3R6K9Z1N
Static task
static1
Behavioral task
behavioral1
Sample
1ed21fff70401a3d2fa8c72965b825594c4158d24fa7e73b390b2fd98ea1bf7fN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1ed21fff70401a3d2fa8c72965b825594c4158d24fa7e73b390b2fd98ea1bf7fN.exe
-
Size
610KB
-
MD5
640c9b831da24047f5bd793949464220
-
SHA1
835e4b82343b7aa9989361dd9136c4d61b1fc17a
-
SHA256
1ed21fff70401a3d2fa8c72965b825594c4158d24fa7e73b390b2fd98ea1bf7f
-
SHA512
fd53f198325232a1895509f18d50641b07c2c185ee3d7e6c21a9a308bee770f338033250e6b943bbeccc23fcca9ac2c176e37eb2d888e7eeec495934ac0e57fd
-
SSDEEP
12288:Py90slz1fACEBre8hMqPOGMv5Fsh+TrG6iwDi3Vbk3K9ZDKOCoN:PyLxforXmZXsx6ix3R6K9Z1N
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1