General
-
Target
c83fde0f88e362be88eef12d3dec6edf7fba5711d78680c4642ff22928a972ab.exe
-
Size
415KB
-
Sample
241119-rp8j3axbjd
-
MD5
1152c1b749a3f840c7539b4963387079
-
SHA1
45c00c518b119807ee65037fe407e15d15a2767f
-
SHA256
c83fde0f88e362be88eef12d3dec6edf7fba5711d78680c4642ff22928a972ab
-
SHA512
541986a371c2799e01b6a426fcb44381f26406cf4d4c1e968d99e102242e09bdbc3e19c9bd514b9d92acb48a32232fcaa40933b93f89af1d28fac5b068f03e6c
-
SSDEEP
6144:zTp0yN90QEa0XxB35YYnbTvBTG8JOlcL0Ie0PHQK3x97mYpNR/HQxDRpZqSkw:Ky90Y0XxBbTvBTTJ3eqHQlm/wxDRpew
Static task
static1
Behavioral task
behavioral1
Sample
c83fde0f88e362be88eef12d3dec6edf7fba5711d78680c4642ff22928a972ab.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c83fde0f88e362be88eef12d3dec6edf7fba5711d78680c4642ff22928a972ab.exe
-
Size
415KB
-
MD5
1152c1b749a3f840c7539b4963387079
-
SHA1
45c00c518b119807ee65037fe407e15d15a2767f
-
SHA256
c83fde0f88e362be88eef12d3dec6edf7fba5711d78680c4642ff22928a972ab
-
SHA512
541986a371c2799e01b6a426fcb44381f26406cf4d4c1e968d99e102242e09bdbc3e19c9bd514b9d92acb48a32232fcaa40933b93f89af1d28fac5b068f03e6c
-
SSDEEP
6144:zTp0yN90QEa0XxB35YYnbTvBTG8JOlcL0Ie0PHQK3x97mYpNR/HQxDRpZqSkw:Ky90Y0XxBbTvBTTJ3eqHQlm/wxDRpew
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1