General
-
Target
d4632b005da27da98bd579db3b8a59a182c2416a56e3824bbfa66529878c8862N.exe
-
Size
609KB
-
Sample
241119-vtbyfaylby
-
MD5
ac7d25f3a4a31e51786cf9337f3c9d50
-
SHA1
b52a166b760de0359742af4b6fa8dca4e742531a
-
SHA256
d4632b005da27da98bd579db3b8a59a182c2416a56e3824bbfa66529878c8862
-
SHA512
07b1ff18f184ad7317c6ed84213a25ae544a263caaaa0913ee783f28ba4522c159bcdaab848f96472438e0a98d3ae812973177ea4b224b9f514bc84fb3c95193
-
SSDEEP
12288:dy903CCBQsKDu8uaUGRl+dYhw9g+QED2A3K6n7w:dyrgEuyREZuEyAakw
Static task
static1
Behavioral task
behavioral1
Sample
d4632b005da27da98bd579db3b8a59a182c2416a56e3824bbfa66529878c8862N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d4632b005da27da98bd579db3b8a59a182c2416a56e3824bbfa66529878c8862N.exe
-
Size
609KB
-
MD5
ac7d25f3a4a31e51786cf9337f3c9d50
-
SHA1
b52a166b760de0359742af4b6fa8dca4e742531a
-
SHA256
d4632b005da27da98bd579db3b8a59a182c2416a56e3824bbfa66529878c8862
-
SHA512
07b1ff18f184ad7317c6ed84213a25ae544a263caaaa0913ee783f28ba4522c159bcdaab848f96472438e0a98d3ae812973177ea4b224b9f514bc84fb3c95193
-
SSDEEP
12288:dy903CCBQsKDu8uaUGRl+dYhw9g+QED2A3K6n7w:dyrgEuyREZuEyAakw
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1