General
-
Target
55cef443332730cdd292ab532674d6c113c1bdcd0617ca49e4a4cd7226d913d0N.exe
-
Size
623KB
-
Sample
241118-vpf2la1cqb
-
MD5
2ab1d37fd3fd4fcc32a961f457d051e0
-
SHA1
00a241802125a730227dcdece89c96669dc4b7b4
-
SHA256
55cef443332730cdd292ab532674d6c113c1bdcd0617ca49e4a4cd7226d913d0
-
SHA512
3e517aca00b0bd8fe7197af094ff73003411dd76094ea8ef44c567508a377bea4adab6d1605c9468b24e82034667b470143820223716c2e55b7d41b37424a5ce
-
SSDEEP
12288:9y90K5Pcv3LEw1s2pDwllcFjLL/miwYPYpO0m0iRKAEOCIB1Y9FSqSf/D:9y9563Is3STcA/409iM/OCIjiSlj
Static task
static1
Behavioral task
behavioral1
Sample
55cef443332730cdd292ab532674d6c113c1bdcd0617ca49e4a4cd7226d913d0N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
55cef443332730cdd292ab532674d6c113c1bdcd0617ca49e4a4cd7226d913d0N.exe
-
Size
623KB
-
MD5
2ab1d37fd3fd4fcc32a961f457d051e0
-
SHA1
00a241802125a730227dcdece89c96669dc4b7b4
-
SHA256
55cef443332730cdd292ab532674d6c113c1bdcd0617ca49e4a4cd7226d913d0
-
SHA512
3e517aca00b0bd8fe7197af094ff73003411dd76094ea8ef44c567508a377bea4adab6d1605c9468b24e82034667b470143820223716c2e55b7d41b37424a5ce
-
SSDEEP
12288:9y90K5Pcv3LEw1s2pDwllcFjLL/miwYPYpO0m0iRKAEOCIB1Y9FSqSf/D:9y9563Is3STcA/409iM/OCIjiSlj
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1