General
-
Target
5841e6f1f1c6e1ebe5822c060324e7298d69e934bd952255f2e5b74cf085775dN.exe
-
Size
623KB
-
Sample
241119-aq7wgsxqd1
-
MD5
6c87bc4ea615a32219a8cee0a8aadf90
-
SHA1
8dd1df76c8f0cf4a119775203a2de5f0983885fe
-
SHA256
5841e6f1f1c6e1ebe5822c060324e7298d69e934bd952255f2e5b74cf085775d
-
SHA512
469e662432c80fec92c3dfc82843dd6b626dfdf3d981084763e18c03f8e7f990ad10ee34a77d5921f374346d13b0fd73bf8ec91e528d7f6e2e571af154872bfe
-
SSDEEP
12288:my90Q4kMQrjx5ISo1U9jpijluhhiuBpw/p9xKXopzRt13y:my6kMRxCGiRw/bzRts
Static task
static1
Behavioral task
behavioral1
Sample
5841e6f1f1c6e1ebe5822c060324e7298d69e934bd952255f2e5b74cf085775dN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5841e6f1f1c6e1ebe5822c060324e7298d69e934bd952255f2e5b74cf085775dN.exe
-
Size
623KB
-
MD5
6c87bc4ea615a32219a8cee0a8aadf90
-
SHA1
8dd1df76c8f0cf4a119775203a2de5f0983885fe
-
SHA256
5841e6f1f1c6e1ebe5822c060324e7298d69e934bd952255f2e5b74cf085775d
-
SHA512
469e662432c80fec92c3dfc82843dd6b626dfdf3d981084763e18c03f8e7f990ad10ee34a77d5921f374346d13b0fd73bf8ec91e528d7f6e2e571af154872bfe
-
SSDEEP
12288:my90Q4kMQrjx5ISo1U9jpijluhhiuBpw/p9xKXopzRt13y:my6kMRxCGiRw/bzRts
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1