General
-
Target
82001a23fde056bd459b9e44ba74ff53d17ab1c1b5cda0c4abc3e9d8472af903N.exe
-
Size
568KB
-
Sample
241119-vgczzaycpg
-
MD5
da3248b168ae8cd97b67a226f22a1a50
-
SHA1
d3d16c6e39d44c084fdb486aaa3c4df94879efc8
-
SHA256
82001a23fde056bd459b9e44ba74ff53d17ab1c1b5cda0c4abc3e9d8472af903
-
SHA512
f973ef6bf71fa3bfd3690b3960ed5dd0994d932786fd5a346f271e1356fd5e8aaa3f810a08a6197079d952fa461989336634c81236388e74418230970b16fc46
-
SSDEEP
12288:ky90wNAu5p6Cniz5BvffCv8lf4mKixyhe:kyR75p6siz5BvffCIh5xys
Static task
static1
Behavioral task
behavioral1
Sample
82001a23fde056bd459b9e44ba74ff53d17ab1c1b5cda0c4abc3e9d8472af903N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
82001a23fde056bd459b9e44ba74ff53d17ab1c1b5cda0c4abc3e9d8472af903N.exe
-
Size
568KB
-
MD5
da3248b168ae8cd97b67a226f22a1a50
-
SHA1
d3d16c6e39d44c084fdb486aaa3c4df94879efc8
-
SHA256
82001a23fde056bd459b9e44ba74ff53d17ab1c1b5cda0c4abc3e9d8472af903
-
SHA512
f973ef6bf71fa3bfd3690b3960ed5dd0994d932786fd5a346f271e1356fd5e8aaa3f810a08a6197079d952fa461989336634c81236388e74418230970b16fc46
-
SSDEEP
12288:ky90wNAu5p6Cniz5BvffCv8lf4mKixyhe:kyR75p6siz5BvffCIh5xys
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1