General
-
Target
1a75bd7ed8f439d053613e56eedba10e84031b450a2b4292beadf035602cae0d.exe
-
Size
414KB
-
Sample
241118-vkzcda1gjp
-
MD5
ee274e04c1b38f53cacf5edcc8c54dcd
-
SHA1
df819c1496e18e9f4b9bcc393d33c52cd6cf52f7
-
SHA256
1a75bd7ed8f439d053613e56eedba10e84031b450a2b4292beadf035602cae0d
-
SHA512
999e0ca90262f439d7f6323f91a550b88e1d67b750396806659de8cbcab5f7177980ae4d715f55f0698edd0f5460adb48de3e5408db40c2de7c53a403a7aa313
-
SSDEEP
6144:Ivp0yN90QEFnIIXPCc6RFJeZBmJWUyNe+hQV9wK3t3gPSHMfHuPk:1y90LpXPj60YizowKd3FguPk
Static task
static1
Behavioral task
behavioral1
Sample
1a75bd7ed8f439d053613e56eedba10e84031b450a2b4292beadf035602cae0d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1a75bd7ed8f439d053613e56eedba10e84031b450a2b4292beadf035602cae0d.exe
-
Size
414KB
-
MD5
ee274e04c1b38f53cacf5edcc8c54dcd
-
SHA1
df819c1496e18e9f4b9bcc393d33c52cd6cf52f7
-
SHA256
1a75bd7ed8f439d053613e56eedba10e84031b450a2b4292beadf035602cae0d
-
SHA512
999e0ca90262f439d7f6323f91a550b88e1d67b750396806659de8cbcab5f7177980ae4d715f55f0698edd0f5460adb48de3e5408db40c2de7c53a403a7aa313
-
SSDEEP
6144:Ivp0yN90QEFnIIXPCc6RFJeZBmJWUyNe+hQV9wK3t3gPSHMfHuPk:1y90LpXPj60YizowKd3FguPk
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1