General
-
Target
a8f1e30b4a28e65b2da97177e2492026a2fbed992889cf5863e52208ac9359c1.exe
-
Size
624KB
-
Sample
241119-3rhl7szpgp
-
MD5
f756114c10e1dab6d849d093be908ec7
-
SHA1
ab0568908db1dac74f0ed39ababdc649825b8890
-
SHA256
a8f1e30b4a28e65b2da97177e2492026a2fbed992889cf5863e52208ac9359c1
-
SHA512
ee473042e8c6ab45aa0e17eb6ecf0f6acbcd3473909051ccd6b79257d475162cefd823b581a02e35c2fa9d0d30f2639e6e7109bc27fbf9502aa93256bed7cf3d
-
SSDEEP
12288:by90dURK+tGLQo5N5ekRJh3NDNsPYAkkmASvKpMGSHxv+eYKzysRG6tdM:byIURKlp3TJV9kZSCfSRxzyKdM
Static task
static1
Behavioral task
behavioral1
Sample
a8f1e30b4a28e65b2da97177e2492026a2fbed992889cf5863e52208ac9359c1.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
a8f1e30b4a28e65b2da97177e2492026a2fbed992889cf5863e52208ac9359c1.exe
-
Size
624KB
-
MD5
f756114c10e1dab6d849d093be908ec7
-
SHA1
ab0568908db1dac74f0ed39ababdc649825b8890
-
SHA256
a8f1e30b4a28e65b2da97177e2492026a2fbed992889cf5863e52208ac9359c1
-
SHA512
ee473042e8c6ab45aa0e17eb6ecf0f6acbcd3473909051ccd6b79257d475162cefd823b581a02e35c2fa9d0d30f2639e6e7109bc27fbf9502aa93256bed7cf3d
-
SSDEEP
12288:by90dURK+tGLQo5N5ekRJh3NDNsPYAkkmASvKpMGSHxv+eYKzysRG6tdM:byIURKlp3TJV9kZSCfSRxzyKdM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1