General
-
Target
efbbe55afde7a468fd259b9f01287b8e8bbcbfbf88094a25019711455afc0f76.exe
-
Size
414KB
-
Sample
241118-wg5wes1hkh
-
MD5
4179f741f68de26c92cf1adb119c7ff4
-
SHA1
4ec3288283966b2dff1c7966d00e923e34ab4ac9
-
SHA256
efbbe55afde7a468fd259b9f01287b8e8bbcbfbf88094a25019711455afc0f76
-
SHA512
717b4d0d985c5ed5c7bbe08d729059a457245e82c6ba0d7f63d44e332829727d506d0681d04b9bd21ff1bf220adc78067d6fb44f0724f91ccc947404150b8b6c
-
SSDEEP
6144:mMp0yN90QEIKNvrqfbDZQqF1VhoA/MFJeZBmJWUyNeSdQV9wK3Qh7dw:Ey907BGzpTFYi3owKAldw
Static task
static1
Behavioral task
behavioral1
Sample
efbbe55afde7a468fd259b9f01287b8e8bbcbfbf88094a25019711455afc0f76.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
efbbe55afde7a468fd259b9f01287b8e8bbcbfbf88094a25019711455afc0f76.exe
-
Size
414KB
-
MD5
4179f741f68de26c92cf1adb119c7ff4
-
SHA1
4ec3288283966b2dff1c7966d00e923e34ab4ac9
-
SHA256
efbbe55afde7a468fd259b9f01287b8e8bbcbfbf88094a25019711455afc0f76
-
SHA512
717b4d0d985c5ed5c7bbe08d729059a457245e82c6ba0d7f63d44e332829727d506d0681d04b9bd21ff1bf220adc78067d6fb44f0724f91ccc947404150b8b6c
-
SSDEEP
6144:mMp0yN90QEIKNvrqfbDZQqF1VhoA/MFJeZBmJWUyNeSdQV9wK3Qh7dw:Ey907BGzpTFYi3owKAldw
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1