General
-
Target
0f613cd2ddac13f58a455ad476ab57a14e85d56698a9acd841764ab569255d4bN.exe
-
Size
469KB
-
Sample
241119-c7nv2szfjl
-
MD5
b561a7335ab067a85e31e36a1c479e30
-
SHA1
0d2830c83db2736b251463919fb6a09f9bd30cb6
-
SHA256
0f613cd2ddac13f58a455ad476ab57a14e85d56698a9acd841764ab569255d4b
-
SHA512
d1cedba38627978e0777765e2656f92874f28144e06d1503fd56cbaa7256a47fe52348c508a855d92e6813f4b49316dc4ed79bee00106a0ad8dc82d7a99d62ca
-
SSDEEP
6144:aIp0yN90QEmLbd9xtD1Q7ghWamyjzDscMvEQrdmpWZdNL1Uk5p33aagds2BM:cy90mblQ7gSozDYsQxmyn3KaYs2BM
Static task
static1
Behavioral task
behavioral1
Sample
0f613cd2ddac13f58a455ad476ab57a14e85d56698a9acd841764ab569255d4bN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
0f613cd2ddac13f58a455ad476ab57a14e85d56698a9acd841764ab569255d4bN.exe
-
Size
469KB
-
MD5
b561a7335ab067a85e31e36a1c479e30
-
SHA1
0d2830c83db2736b251463919fb6a09f9bd30cb6
-
SHA256
0f613cd2ddac13f58a455ad476ab57a14e85d56698a9acd841764ab569255d4b
-
SHA512
d1cedba38627978e0777765e2656f92874f28144e06d1503fd56cbaa7256a47fe52348c508a855d92e6813f4b49316dc4ed79bee00106a0ad8dc82d7a99d62ca
-
SSDEEP
6144:aIp0yN90QEmLbd9xtD1Q7ghWamyjzDscMvEQrdmpWZdNL1Uk5p33aagds2BM:cy90mblQ7gSozDYsQxmyn3KaYs2BM
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1