General
-
Target
be81a27c72bc53b07769dca709535b2bd090062c2ba6a6364c473b21a754f484.exe
-
Size
568KB
-
Sample
241119-pcby8a1jep
-
MD5
390fdbe6132a241f23ec6cb32a966d8e
-
SHA1
5ee957da19ec2d9e7fb59631d60aeb5a93fb08b0
-
SHA256
be81a27c72bc53b07769dca709535b2bd090062c2ba6a6364c473b21a754f484
-
SHA512
21d7cce293ed54564d47f28cfe13860a2dcd2ae0b01a6f002a9deff2611712fce5ee64f16e65c486b43731e0a13dad43c0de8889c397482f998224a39709bb56
-
SSDEEP
12288:1y90bxCpGQ6/E/TMT7/IwGxGH9zbPVJnAo/H:1yaU/sOTq7XRAaH
Static task
static1
Behavioral task
behavioral1
Sample
be81a27c72bc53b07769dca709535b2bd090062c2ba6a6364c473b21a754f484.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
be81a27c72bc53b07769dca709535b2bd090062c2ba6a6364c473b21a754f484.exe
-
Size
568KB
-
MD5
390fdbe6132a241f23ec6cb32a966d8e
-
SHA1
5ee957da19ec2d9e7fb59631d60aeb5a93fb08b0
-
SHA256
be81a27c72bc53b07769dca709535b2bd090062c2ba6a6364c473b21a754f484
-
SHA512
21d7cce293ed54564d47f28cfe13860a2dcd2ae0b01a6f002a9deff2611712fce5ee64f16e65c486b43731e0a13dad43c0de8889c397482f998224a39709bb56
-
SSDEEP
12288:1y90bxCpGQ6/E/TMT7/IwGxGH9zbPVJnAo/H:1yaU/sOTq7XRAaH
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1