General
-
Target
58a13efad5fed21f56da382284e895b969b5fcc16f3cd20f4a9183c7fcde8604.exe
-
Size
624KB
-
Sample
241119-m4z41swapl
-
MD5
c0e38ceb9bd20f002e032a1fcd4aa7e2
-
SHA1
46f671d80d56a6c0e49107672d5f2f01a8757d6b
-
SHA256
58a13efad5fed21f56da382284e895b969b5fcc16f3cd20f4a9183c7fcde8604
-
SHA512
b7a07ae37e77986ddc9241f2ffef5470c59b992be410d3663726fe491537d22cce4524310488ba08faa228136620750048685d31cef4c8fb7c9344088a8a402e
-
SSDEEP
12288:dy90JAT3rXD3ke5hrG25ACigptReVu0Khbfog79RnbJeNTqrsQA:dy6+35XrGCigptiOZwgbF2+4QA
Static task
static1
Behavioral task
behavioral1
Sample
58a13efad5fed21f56da382284e895b969b5fcc16f3cd20f4a9183c7fcde8604.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
58a13efad5fed21f56da382284e895b969b5fcc16f3cd20f4a9183c7fcde8604.exe
-
Size
624KB
-
MD5
c0e38ceb9bd20f002e032a1fcd4aa7e2
-
SHA1
46f671d80d56a6c0e49107672d5f2f01a8757d6b
-
SHA256
58a13efad5fed21f56da382284e895b969b5fcc16f3cd20f4a9183c7fcde8604
-
SHA512
b7a07ae37e77986ddc9241f2ffef5470c59b992be410d3663726fe491537d22cce4524310488ba08faa228136620750048685d31cef4c8fb7c9344088a8a402e
-
SSDEEP
12288:dy90JAT3rXD3ke5hrG25ACigptReVu0Khbfog79RnbJeNTqrsQA:dy6+35XrGCigptiOZwgbF2+4QA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1