General
-
Target
a214c4b030e1123fdeaa6c6cb471216d502a8ac437183a51e6da030340248381.exe
-
Size
470KB
-
Sample
241119-adkv7axpft
-
MD5
85b2659960d6aa713680b90fbd45cd39
-
SHA1
800d80255fa0d727cbb3524ac654394de72ad067
-
SHA256
a214c4b030e1123fdeaa6c6cb471216d502a8ac437183a51e6da030340248381
-
SHA512
bfac2b3edcf02ffd8b931b7d31899aeb4354a10397c5d0aa89035e58a42202f9e5365fe735982553d36a0590f8ab52a6c95ca806f1ff4bf6da42c37d2f52df0d
-
SSDEEP
12288:4y90/+WVqOdn6UZBweulubRJg7YRqyIGj6hI:4y2+rKn6UP4lgXgihIGmI
Static task
static1
Behavioral task
behavioral1
Sample
a214c4b030e1123fdeaa6c6cb471216d502a8ac437183a51e6da030340248381.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
a214c4b030e1123fdeaa6c6cb471216d502a8ac437183a51e6da030340248381.exe
-
Size
470KB
-
MD5
85b2659960d6aa713680b90fbd45cd39
-
SHA1
800d80255fa0d727cbb3524ac654394de72ad067
-
SHA256
a214c4b030e1123fdeaa6c6cb471216d502a8ac437183a51e6da030340248381
-
SHA512
bfac2b3edcf02ffd8b931b7d31899aeb4354a10397c5d0aa89035e58a42202f9e5365fe735982553d36a0590f8ab52a6c95ca806f1ff4bf6da42c37d2f52df0d
-
SSDEEP
12288:4y90/+WVqOdn6UZBweulubRJg7YRqyIGj6hI:4y2+rKn6UP4lgXgihIGmI
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1