General
-
Target
7d23cf22d46313f8fd71270592e0bb8ee46f710ce2a90673d2e876129885c32eN.exe
-
Size
470KB
-
Sample
241119-plv4fswjbx
-
MD5
b38bea1eb58f50ffb36634e3dcdf2170
-
SHA1
026e2071a18305542a9a9aa16e3462eae7a7fc2a
-
SHA256
7d23cf22d46313f8fd71270592e0bb8ee46f710ce2a90673d2e876129885c32e
-
SHA512
29a4a90b86641cae5c5806f234891df843f59e915f819d66831e22d1c4a2c229aa195014ce4df5972fac7d4ee0634a87514a2f082a48b3740dfa34223e23f94b
-
SSDEEP
12288:ty90OtwN5AsVK32idNPDCLbRyg7fRUuHKM2Y7:tyBOYaidNsYgVxV2Y7
Static task
static1
Behavioral task
behavioral1
Sample
7d23cf22d46313f8fd71270592e0bb8ee46f710ce2a90673d2e876129885c32eN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7d23cf22d46313f8fd71270592e0bb8ee46f710ce2a90673d2e876129885c32eN.exe
-
Size
470KB
-
MD5
b38bea1eb58f50ffb36634e3dcdf2170
-
SHA1
026e2071a18305542a9a9aa16e3462eae7a7fc2a
-
SHA256
7d23cf22d46313f8fd71270592e0bb8ee46f710ce2a90673d2e876129885c32e
-
SHA512
29a4a90b86641cae5c5806f234891df843f59e915f819d66831e22d1c4a2c229aa195014ce4df5972fac7d4ee0634a87514a2f082a48b3740dfa34223e23f94b
-
SSDEEP
12288:ty90OtwN5AsVK32idNPDCLbRyg7fRUuHKM2Y7:tyBOYaidNsYgVxV2Y7
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1