General
-
Target
2683a1bf1797869775567e84f2687097e42d23c0754510f6548bef620270a7c5N.exe
-
Size
624KB
-
Sample
241119-aha7jsxphz
-
MD5
f86716b1b87dbab138619f79a62b77f0
-
SHA1
72427e0f1c7c5a729d49b0498299c3ef664d3ccb
-
SHA256
2683a1bf1797869775567e84f2687097e42d23c0754510f6548bef620270a7c5
-
SHA512
49929cda3715743e5b21592ba61f32e9b52d7d0ad182c2ef214f5b3f226fadd844471f0d1595b4850432205c976a6c1131111e823934f63783423e9dd94ee3af
-
SSDEEP
12288:vy90bwSK6kd4IvmED6pcTohiuY2w/p9xsIe2Q4D:vyc7pI1DWcTgRw/2Iex+
Static task
static1
Behavioral task
behavioral1
Sample
2683a1bf1797869775567e84f2687097e42d23c0754510f6548bef620270a7c5N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2683a1bf1797869775567e84f2687097e42d23c0754510f6548bef620270a7c5N.exe
-
Size
624KB
-
MD5
f86716b1b87dbab138619f79a62b77f0
-
SHA1
72427e0f1c7c5a729d49b0498299c3ef664d3ccb
-
SHA256
2683a1bf1797869775567e84f2687097e42d23c0754510f6548bef620270a7c5
-
SHA512
49929cda3715743e5b21592ba61f32e9b52d7d0ad182c2ef214f5b3f226fadd844471f0d1595b4850432205c976a6c1131111e823934f63783423e9dd94ee3af
-
SSDEEP
12288:vy90bwSK6kd4IvmED6pcTohiuY2w/p9xsIe2Q4D:vyc7pI1DWcTgRw/2Iex+
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1