General
-
Target
c66ebd7f8b6c96224a0dc1093c4ab6fe27953a6f4edb9a95e6713fbf87512ad4.exe
-
Size
609KB
-
Sample
241119-v8wldsyflf
-
MD5
69d624ec1d8a39e0f1ad4c947d3f163b
-
SHA1
43fde8eee100bcb6cacc1ee338ebd1d6277be1aa
-
SHA256
c66ebd7f8b6c96224a0dc1093c4ab6fe27953a6f4edb9a95e6713fbf87512ad4
-
SHA512
f71519961611a26cfb18deac02e2918025501fa1c94d3fdd0be7598030696b88c4d330e2737ca6c04892015a70e62b5ff0428af0ee29e874f8490d8b8ea80e95
-
SSDEEP
12288:iy90+JPdEB9WGK9BpbHz3BJcdjGbn6PbZJgxEaR/nC:iy5PdEPkpzzRJcAD6jrgzxnC
Static task
static1
Behavioral task
behavioral1
Sample
c66ebd7f8b6c96224a0dc1093c4ab6fe27953a6f4edb9a95e6713fbf87512ad4.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c66ebd7f8b6c96224a0dc1093c4ab6fe27953a6f4edb9a95e6713fbf87512ad4.exe
-
Size
609KB
-
MD5
69d624ec1d8a39e0f1ad4c947d3f163b
-
SHA1
43fde8eee100bcb6cacc1ee338ebd1d6277be1aa
-
SHA256
c66ebd7f8b6c96224a0dc1093c4ab6fe27953a6f4edb9a95e6713fbf87512ad4
-
SHA512
f71519961611a26cfb18deac02e2918025501fa1c94d3fdd0be7598030696b88c4d330e2737ca6c04892015a70e62b5ff0428af0ee29e874f8490d8b8ea80e95
-
SSDEEP
12288:iy90+JPdEB9WGK9BpbHz3BJcdjGbn6PbZJgxEaR/nC:iy5PdEPkpzzRJcAD6jrgzxnC
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1