General
-
Target
bfdc5e57b2211202f4b560b067e83914e1ed6a4c4e9ce9135cb44391332e09dbN.exe
-
Size
470KB
-
Sample
241119-kl7p2asfjc
-
MD5
48f2a13a578af945e53132e0faaa0320
-
SHA1
1fc440c1d909c64abad6efaf50f499647683b0be
-
SHA256
bfdc5e57b2211202f4b560b067e83914e1ed6a4c4e9ce9135cb44391332e09db
-
SHA512
a2796367138d7dce6a4f5a72426e86d5ef0b885d3d3c50f419728cf42c44de15ca3a5810309bed4bce304a9ab476534337709fb30dce91fbca1443951d3efa3d
-
SSDEEP
6144:GYp0yN90QEIFOh9YHUGxNIoH/saGPT4h/qubUG58vU/p9xVVIp7ISdtX8PWmyUu:Qy90qF50GxREjT4hiu5Oc/p9xhJu
Static task
static1
Behavioral task
behavioral1
Sample
bfdc5e57b2211202f4b560b067e83914e1ed6a4c4e9ce9135cb44391332e09dbN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
bfdc5e57b2211202f4b560b067e83914e1ed6a4c4e9ce9135cb44391332e09dbN.exe
-
Size
470KB
-
MD5
48f2a13a578af945e53132e0faaa0320
-
SHA1
1fc440c1d909c64abad6efaf50f499647683b0be
-
SHA256
bfdc5e57b2211202f4b560b067e83914e1ed6a4c4e9ce9135cb44391332e09db
-
SHA512
a2796367138d7dce6a4f5a72426e86d5ef0b885d3d3c50f419728cf42c44de15ca3a5810309bed4bce304a9ab476534337709fb30dce91fbca1443951d3efa3d
-
SSDEEP
6144:GYp0yN90QEIFOh9YHUGxNIoH/saGPT4h/qubUG58vU/p9xVVIp7ISdtX8PWmyUu:Qy90qF50GxREjT4hiu5Oc/p9xhJu
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1