General
-
Target
eea64a5f46b7ef62c177792ce11b8d392428eeb3c726b4b8de2de76694ab3875.exe
-
Size
623KB
-
Sample
241119-lk51gsvakr
-
MD5
2d3163d552df3b50229249801e8a6315
-
SHA1
79d2adab5f95fc42dd57c0fd3915a79d147ca8b1
-
SHA256
eea64a5f46b7ef62c177792ce11b8d392428eeb3c726b4b8de2de76694ab3875
-
SHA512
b9a1ececf37066a58d7e7f64540545c924b35b7d624d79fd833d9acca8147abc56b0d25fc68261f1e0b6af9b14351bf7ae9e77fe13b40e698a22f54f9274c9eb
-
SSDEEP
12288:ty907AE9P49n/ilIx9FHR4NhiuB7C/p9xBA1HPlpTJepZ392CFO:ty4N4VG8OvRM/YhPlfepZRO
Static task
static1
Behavioral task
behavioral1
Sample
eea64a5f46b7ef62c177792ce11b8d392428eeb3c726b4b8de2de76694ab3875.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
eea64a5f46b7ef62c177792ce11b8d392428eeb3c726b4b8de2de76694ab3875.exe
-
Size
623KB
-
MD5
2d3163d552df3b50229249801e8a6315
-
SHA1
79d2adab5f95fc42dd57c0fd3915a79d147ca8b1
-
SHA256
eea64a5f46b7ef62c177792ce11b8d392428eeb3c726b4b8de2de76694ab3875
-
SHA512
b9a1ececf37066a58d7e7f64540545c924b35b7d624d79fd833d9acca8147abc56b0d25fc68261f1e0b6af9b14351bf7ae9e77fe13b40e698a22f54f9274c9eb
-
SSDEEP
12288:ty907AE9P49n/ilIx9FHR4NhiuB7C/p9xBA1HPlpTJepZ392CFO:ty4N4VG8OvRM/YhPlfepZRO
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1