General
-
Target
dce2023b0ab522b4a68fd5dd82ce4670a107916260ede9d05e2d77c295286210.exe
-
Size
806KB
-
Sample
241119-an4faayemr
-
MD5
38057222abd5921a9d9b77e701e81a4a
-
SHA1
0f8594548a3d8541d64290517a94af9756dd59b0
-
SHA256
dce2023b0ab522b4a68fd5dd82ce4670a107916260ede9d05e2d77c295286210
-
SHA512
09a72ddd84ca125d1b151069f6c4bed482395f5de3e7be1076ac8b9de0b259b6286cafdf9bb8a40f29b82231b3f723fef5b72a0f836350ba1cd98d6d00eb3620
-
SSDEEP
12288:uy90AEiGi8Q3x1Z5mZmnhiub5h/p9xflHWBoKCQsooIn3GQ:uynElGhgQR3/pl2BoBI2Q
Static task
static1
Behavioral task
behavioral1
Sample
dce2023b0ab522b4a68fd5dd82ce4670a107916260ede9d05e2d77c295286210.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
dce2023b0ab522b4a68fd5dd82ce4670a107916260ede9d05e2d77c295286210.exe
-
Size
806KB
-
MD5
38057222abd5921a9d9b77e701e81a4a
-
SHA1
0f8594548a3d8541d64290517a94af9756dd59b0
-
SHA256
dce2023b0ab522b4a68fd5dd82ce4670a107916260ede9d05e2d77c295286210
-
SHA512
09a72ddd84ca125d1b151069f6c4bed482395f5de3e7be1076ac8b9de0b259b6286cafdf9bb8a40f29b82231b3f723fef5b72a0f836350ba1cd98d6d00eb3620
-
SSDEEP
12288:uy90AEiGi8Q3x1Z5mZmnhiub5h/p9xflHWBoKCQsooIn3GQ:uynElGhgQR3/pl2BoBI2Q
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1