General
-
Target
254de53e181c0b4e15dc5a1bba0b08c6322d9088d41bfe79d15e2d79b755ca1bN.exe
-
Size
766KB
-
Sample
241119-t85zdsygqn
-
MD5
c2993d421ef9d0712b3ba444dbabc500
-
SHA1
26da41c16233ca387a61f8a72df8801986e97b79
-
SHA256
254de53e181c0b4e15dc5a1bba0b08c6322d9088d41bfe79d15e2d79b755ca1b
-
SHA512
8062ff556dbaf571bd032c6ec1fcc2d722f29e10b3448bfc5a8c7c48950c409cfd68fc737515ddf8f7544a946ed8a471c9c346bc2fa1dc9646451d3c4f502832
-
SSDEEP
12288:dy90vMpqFS/w7Fa/+PB3hzkpCV34Rnn9WG1hiu0zE/prxAko4m:dywMpqFS/wZe+Z31tsn9WGHRz/I
Static task
static1
Behavioral task
behavioral1
Sample
254de53e181c0b4e15dc5a1bba0b08c6322d9088d41bfe79d15e2d79b755ca1bN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
254de53e181c0b4e15dc5a1bba0b08c6322d9088d41bfe79d15e2d79b755ca1bN.exe
-
Size
766KB
-
MD5
c2993d421ef9d0712b3ba444dbabc500
-
SHA1
26da41c16233ca387a61f8a72df8801986e97b79
-
SHA256
254de53e181c0b4e15dc5a1bba0b08c6322d9088d41bfe79d15e2d79b755ca1b
-
SHA512
8062ff556dbaf571bd032c6ec1fcc2d722f29e10b3448bfc5a8c7c48950c409cfd68fc737515ddf8f7544a946ed8a471c9c346bc2fa1dc9646451d3c4f502832
-
SSDEEP
12288:dy90vMpqFS/w7Fa/+PB3hzkpCV34Rnn9WG1hiu0zE/prxAko4m:dywMpqFS/wZe+Z31tsn9WGHRz/I
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1