General
-
Target
d080f552447e3e8f698b811c555bc7841bbd9c0c88dd7a9b72b0cbe44c4d4c99N.exe
-
Size
610KB
-
Sample
241118-z56dmsvpex
-
MD5
0d6d450bb1dddd26e73dca94862066a0
-
SHA1
f5abdbb4d164cb75fea06a98346443e35014c618
-
SHA256
d080f552447e3e8f698b811c555bc7841bbd9c0c88dd7a9b72b0cbe44c4d4c99
-
SHA512
af68d01bcdf50cb9020d348cece102a25d51293212c224a973afe0efc2fe66678f3f596ea2f2aca84faa825c32c965118984e88b6f5902503278f45dda5c1993
-
SSDEEP
12288:Iy90iBo1nIDSaUxFSzBK/NIkeSbZJgrqaRY:IyD7AxF6B6NdLrgbu
Static task
static1
Behavioral task
behavioral1
Sample
d080f552447e3e8f698b811c555bc7841bbd9c0c88dd7a9b72b0cbe44c4d4c99N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d080f552447e3e8f698b811c555bc7841bbd9c0c88dd7a9b72b0cbe44c4d4c99N.exe
-
Size
610KB
-
MD5
0d6d450bb1dddd26e73dca94862066a0
-
SHA1
f5abdbb4d164cb75fea06a98346443e35014c618
-
SHA256
d080f552447e3e8f698b811c555bc7841bbd9c0c88dd7a9b72b0cbe44c4d4c99
-
SHA512
af68d01bcdf50cb9020d348cece102a25d51293212c224a973afe0efc2fe66678f3f596ea2f2aca84faa825c32c965118984e88b6f5902503278f45dda5c1993
-
SSDEEP
12288:Iy90iBo1nIDSaUxFSzBK/NIkeSbZJgrqaRY:IyD7AxF6B6NdLrgbu
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1