General
-
Target
45457b06c2f52e05133795932700d9e5c087767203256bf86ce7fa3cb16978feN.exe
-
Size
610KB
-
Sample
241119-vnq56szalm
-
MD5
7f0140c6d614eee369a5e146c0a89990
-
SHA1
984e4df1bd9ab00147e1537068f0618d8e8be0fb
-
SHA256
45457b06c2f52e05133795932700d9e5c087767203256bf86ce7fa3cb16978fe
-
SHA512
dfff4d6e6eeba3d9f511ae3609501c8ddbf955e6c06b98376f98be0f36527521db39360ffb9c1a3e03fed85d1ee5515d195bce0bb32fc5131b12e3f7b7e2ae84
-
SSDEEP
12288:Ly90NFIV7gp2mU9U+yTtXE1gbZJgEnaR4ETl:LyKp2dyTd5rgbBB
Static task
static1
Behavioral task
behavioral1
Sample
45457b06c2f52e05133795932700d9e5c087767203256bf86ce7fa3cb16978feN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
45457b06c2f52e05133795932700d9e5c087767203256bf86ce7fa3cb16978feN.exe
-
Size
610KB
-
MD5
7f0140c6d614eee369a5e146c0a89990
-
SHA1
984e4df1bd9ab00147e1537068f0618d8e8be0fb
-
SHA256
45457b06c2f52e05133795932700d9e5c087767203256bf86ce7fa3cb16978fe
-
SHA512
dfff4d6e6eeba3d9f511ae3609501c8ddbf955e6c06b98376f98be0f36527521db39360ffb9c1a3e03fed85d1ee5515d195bce0bb32fc5131b12e3f7b7e2ae84
-
SSDEEP
12288:Ly90NFIV7gp2mU9U+yTtXE1gbZJgEnaR4ETl:LyKp2dyTd5rgbBB
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1