General
-
Target
8fe2cf7d4be4279ca2185423e71527b26688a0dada08179221d40526e0255aa6.exe
-
Size
807KB
-
Sample
241119-mt89yavhjq
-
MD5
ef53c9dc3ec1b0037f70fc308965fb30
-
SHA1
6dd7ea07fa412e4257fdb932cc7b6c6bd35e5692
-
SHA256
8fe2cf7d4be4279ca2185423e71527b26688a0dada08179221d40526e0255aa6
-
SHA512
15d6c5a04683c9a98448df5c327a4f4f8b2b555b775fd50ceacf9de9f5e190dab9ba19febad9e6a0e8297368cc371476bbddbfd82c7e21ae8bc97065f65ffbcc
-
SSDEEP
12288:3y90bOadmaC9s175HoJAdqco0wbEvbGtg7CRuMrCTDro2usVQm/NW3+Lec2UD:3ydxapNoJ1co0RGgMIQ2xCmo3+L3lD
Static task
static1
Behavioral task
behavioral1
Sample
8fe2cf7d4be4279ca2185423e71527b26688a0dada08179221d40526e0255aa6.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8fe2cf7d4be4279ca2185423e71527b26688a0dada08179221d40526e0255aa6.exe
-
Size
807KB
-
MD5
ef53c9dc3ec1b0037f70fc308965fb30
-
SHA1
6dd7ea07fa412e4257fdb932cc7b6c6bd35e5692
-
SHA256
8fe2cf7d4be4279ca2185423e71527b26688a0dada08179221d40526e0255aa6
-
SHA512
15d6c5a04683c9a98448df5c327a4f4f8b2b555b775fd50ceacf9de9f5e190dab9ba19febad9e6a0e8297368cc371476bbddbfd82c7e21ae8bc97065f65ffbcc
-
SSDEEP
12288:3y90bOadmaC9s175HoJAdqco0wbEvbGtg7CRuMrCTDro2usVQm/NW3+Lec2UD:3ydxapNoJ1co0RGgMIQ2xCmo3+L3lD
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1