General
-
Target
1628d744b016edf44d2a2a8c9d1dc70702cb9e3191082dfc6b6f2579739fb83b.exe
-
Size
470KB
-
Sample
241119-tqs7wayflq
-
MD5
6f6e3086e9371f41cf6343f3ddb979db
-
SHA1
bd3dc7e3bcea40e0d16e0099043ef34baa07e035
-
SHA256
1628d744b016edf44d2a2a8c9d1dc70702cb9e3191082dfc6b6f2579739fb83b
-
SHA512
5d195ac079e3615d91f08ca86f1503b31eb2d239c5192b65dc03181f6d0cdc0810ba7ad4102115371d27b179e5eaba9c13843b64b29c7568d7e9c34363f15856
-
SSDEEP
12288:ay90ZW13zbFPdvMn2seEhzn+/TI9oO401:ayyq3VlvO2Pgz+/Ts401
Static task
static1
Behavioral task
behavioral1
Sample
1628d744b016edf44d2a2a8c9d1dc70702cb9e3191082dfc6b6f2579739fb83b.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1628d744b016edf44d2a2a8c9d1dc70702cb9e3191082dfc6b6f2579739fb83b.exe
-
Size
470KB
-
MD5
6f6e3086e9371f41cf6343f3ddb979db
-
SHA1
bd3dc7e3bcea40e0d16e0099043ef34baa07e035
-
SHA256
1628d744b016edf44d2a2a8c9d1dc70702cb9e3191082dfc6b6f2579739fb83b
-
SHA512
5d195ac079e3615d91f08ca86f1503b31eb2d239c5192b65dc03181f6d0cdc0810ba7ad4102115371d27b179e5eaba9c13843b64b29c7568d7e9c34363f15856
-
SSDEEP
12288:ay90ZW13zbFPdvMn2seEhzn+/TI9oO401:ayyq3VlvO2Pgz+/Ts401
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1