General
-
Target
b318feea97ba1c6825409ec28567fea621ac968a0a40179dd809af17be0604f4.exe
-
Size
610KB
-
Sample
241119-kwa4tasgld
-
MD5
875d8d2599d91d56bead49e8fd5f0577
-
SHA1
ed917bfc632b1e86db04ee57050933cb219f8d28
-
SHA256
b318feea97ba1c6825409ec28567fea621ac968a0a40179dd809af17be0604f4
-
SHA512
1a7ec79f4a8f592ca17bcbe6aec0b6be83ae08f77da1792af05825f3ff418fd64e45a7c6aea7a708a6f2729f614636ae01a47b23f650dffa0ce3945919882f33
-
SSDEEP
12288:4y90H1KNtL3JmHxFrcA9UqaAlNcswCU3K9ZDSOCvfA:4yW1a3J8GzAEcKK9ZcfA
Static task
static1
Behavioral task
behavioral1
Sample
b318feea97ba1c6825409ec28567fea621ac968a0a40179dd809af17be0604f4.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b318feea97ba1c6825409ec28567fea621ac968a0a40179dd809af17be0604f4.exe
-
Size
610KB
-
MD5
875d8d2599d91d56bead49e8fd5f0577
-
SHA1
ed917bfc632b1e86db04ee57050933cb219f8d28
-
SHA256
b318feea97ba1c6825409ec28567fea621ac968a0a40179dd809af17be0604f4
-
SHA512
1a7ec79f4a8f592ca17bcbe6aec0b6be83ae08f77da1792af05825f3ff418fd64e45a7c6aea7a708a6f2729f614636ae01a47b23f650dffa0ce3945919882f33
-
SSDEEP
12288:4y90H1KNtL3JmHxFrcA9UqaAlNcswCU3K9ZDSOCvfA:4yW1a3J8GzAEcKK9ZcfA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1