General
-
Target
39efe3e05a883c0e67e15a7aa932bdb38723dcbebed37937f9f69a7534f48871N.exe
-
Size
469KB
-
Sample
241119-kcqp6axnal
-
MD5
adb66093056eea9b63db28f46ed2c9e0
-
SHA1
261c58649197b96487fccbfc1b2938b41cc536b1
-
SHA256
39efe3e05a883c0e67e15a7aa932bdb38723dcbebed37937f9f69a7534f48871
-
SHA512
4e8a521196ace26c0e9f61badfd35d6e293c737a174d4c0a2aef1bf59b08bdff9ec072f5b3d6dee36921704d031c8a6c34691d387df2f2dd8f83d87e46ce35cb
-
SSDEEP
6144:TMp0yN90QE2Y1yYaKz5p1GB7j6IjowqZwOxZz0skMR0uFGi6VHcwBxgwEBezXNeq:By90AvYaKzz0B6IjowqyT4FAL3EBcXd
Static task
static1
Behavioral task
behavioral1
Sample
39efe3e05a883c0e67e15a7aa932bdb38723dcbebed37937f9f69a7534f48871N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
39efe3e05a883c0e67e15a7aa932bdb38723dcbebed37937f9f69a7534f48871N.exe
-
Size
469KB
-
MD5
adb66093056eea9b63db28f46ed2c9e0
-
SHA1
261c58649197b96487fccbfc1b2938b41cc536b1
-
SHA256
39efe3e05a883c0e67e15a7aa932bdb38723dcbebed37937f9f69a7534f48871
-
SHA512
4e8a521196ace26c0e9f61badfd35d6e293c737a174d4c0a2aef1bf59b08bdff9ec072f5b3d6dee36921704d031c8a6c34691d387df2f2dd8f83d87e46ce35cb
-
SSDEEP
6144:TMp0yN90QE2Y1yYaKz5p1GB7j6IjowqZwOxZz0skMR0uFGi6VHcwBxgwEBezXNeq:By90AvYaKzz0B6IjowqyT4FAL3EBcXd
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1