General
-
Target
ae02c8bf7d7fbd027be1371675292ada6f2024d27db7b090483657f0664f98fcN.exe
-
Size
552KB
-
Sample
241119-mg8smszjdq
-
MD5
403b460d3a19a5e41f1ed72814c1d870
-
SHA1
3ecce1f922ccb7bab869fa6e13a0a91fbd272221
-
SHA256
ae02c8bf7d7fbd027be1371675292ada6f2024d27db7b090483657f0664f98fc
-
SHA512
1393bfb5c14ae2e371c28749d526a1e4850f0bec151cf4c431f85e9aed7ebd282ba6cb3d626d5ed97d865d23bb3f094a5bf924ab36c84c7f2c6e8ba55b860d00
-
SSDEEP
12288:Uy90Oa05TxcKnqGIsXNRPW06Ay+IRW10xqdrnJY8c09QZQ6/r:UyZH4yPNRPWHP01drnTcWA
Static task
static1
Behavioral task
behavioral1
Sample
ae02c8bf7d7fbd027be1371675292ada6f2024d27db7b090483657f0664f98fcN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ae02c8bf7d7fbd027be1371675292ada6f2024d27db7b090483657f0664f98fcN.exe
-
Size
552KB
-
MD5
403b460d3a19a5e41f1ed72814c1d870
-
SHA1
3ecce1f922ccb7bab869fa6e13a0a91fbd272221
-
SHA256
ae02c8bf7d7fbd027be1371675292ada6f2024d27db7b090483657f0664f98fc
-
SHA512
1393bfb5c14ae2e371c28749d526a1e4850f0bec151cf4c431f85e9aed7ebd282ba6cb3d626d5ed97d865d23bb3f094a5bf924ab36c84c7f2c6e8ba55b860d00
-
SSDEEP
12288:Uy90Oa05TxcKnqGIsXNRPW06Ay+IRW10xqdrnJY8c09QZQ6/r:UyZH4yPNRPWHP01drnTcWA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1