General
-
Target
5d8f05c08885ad33d71ded7787d7a84e9143b82575d0a9902ead5ce83f819a0dN.exe
-
Size
470KB
-
Sample
241120-fkpqls1dme
-
MD5
022575a04f9c0c6f88e1d3051e4c1790
-
SHA1
2bc12741fbc971b6db3dacdb5c7fe4159537d5a7
-
SHA256
5d8f05c08885ad33d71ded7787d7a84e9143b82575d0a9902ead5ce83f819a0d
-
SHA512
c112a3bf1dfd9f3374564014fb556fd5c03185112c8d3375dba56105e17fe95f5fb40f2363409ab50d8a06859df4d047b4f680fb33889ee670eb4f03307d593e
-
SSDEEP
6144:btp0yN90QEbBIUjqWhpdmRFFwdKpeKKXnLfq3baQbayukk17+8GVdxhSOJBk:Uy908UqGPAFzM3Ly3bRPg7+RJs
Static task
static1
Behavioral task
behavioral1
Sample
5d8f05c08885ad33d71ded7787d7a84e9143b82575d0a9902ead5ce83f819a0dN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5d8f05c08885ad33d71ded7787d7a84e9143b82575d0a9902ead5ce83f819a0dN.exe
-
Size
470KB
-
MD5
022575a04f9c0c6f88e1d3051e4c1790
-
SHA1
2bc12741fbc971b6db3dacdb5c7fe4159537d5a7
-
SHA256
5d8f05c08885ad33d71ded7787d7a84e9143b82575d0a9902ead5ce83f819a0d
-
SHA512
c112a3bf1dfd9f3374564014fb556fd5c03185112c8d3375dba56105e17fe95f5fb40f2363409ab50d8a06859df4d047b4f680fb33889ee670eb4f03307d593e
-
SSDEEP
6144:btp0yN90QEbBIUjqWhpdmRFFwdKpeKKXnLfq3baQbayukk17+8GVdxhSOJBk:Uy908UqGPAFzM3Ly3bRPg7+RJs
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1