General
-
Target
f266c2cd056f2d343fc412ddf5e754e54a662766efc7648ed1f853c1e1f8da73N.exe
-
Size
414KB
-
Sample
241118-wje3sa1hnh
-
MD5
e90c084390f7401bacc234216f7ecca0
-
SHA1
6920719bc14a034399823c15b2489cad118c65ae
-
SHA256
f266c2cd056f2d343fc412ddf5e754e54a662766efc7648ed1f853c1e1f8da73
-
SHA512
e1fcf2bd53020351277b31b3989448d571e8807a4d1e4237522afd3d5d0338267418868e88b1c87416b0022a91e9e4f2ea28134f4493298eeb40daa7ec84a17c
-
SSDEEP
6144:jYp0yN90QE3Grc+5SwIEurlpN87//ylgrpiU9EOqGRPXNETs21gt2b:Vy90mc+5H+K7/2grpiU2Oq0dEh1gIb
Static task
static1
Behavioral task
behavioral1
Sample
f266c2cd056f2d343fc412ddf5e754e54a662766efc7648ed1f853c1e1f8da73N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f266c2cd056f2d343fc412ddf5e754e54a662766efc7648ed1f853c1e1f8da73N.exe
-
Size
414KB
-
MD5
e90c084390f7401bacc234216f7ecca0
-
SHA1
6920719bc14a034399823c15b2489cad118c65ae
-
SHA256
f266c2cd056f2d343fc412ddf5e754e54a662766efc7648ed1f853c1e1f8da73
-
SHA512
e1fcf2bd53020351277b31b3989448d571e8807a4d1e4237522afd3d5d0338267418868e88b1c87416b0022a91e9e4f2ea28134f4493298eeb40daa7ec84a17c
-
SSDEEP
6144:jYp0yN90QE3Grc+5SwIEurlpN87//ylgrpiU9EOqGRPXNETs21gt2b:Vy90mc+5H+K7/2grpiU2Oq0dEh1gIb
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1