General
-
Target
408c62dc406ef56f7419da76d094186835c602561f4996384a8e237b7c91bff4
-
Size
553KB
-
Sample
241121-22h52swpfr
-
MD5
edb080b25e02a4fb6a91e990bc2f2c47
-
SHA1
da5e88f92e424d646de311848c7ae6f3344610d5
-
SHA256
408c62dc406ef56f7419da76d094186835c602561f4996384a8e237b7c91bff4
-
SHA512
1cad0e7dabfe343a35b3996276fd9b5ddf2bfc63da65a93319fb1f4b075ded7710f21719bb6bc2e6ddd5ca507c079ddfb89c457481bab1415e80bdb8387181f4
-
SSDEEP
12288:Hy90P7+Pix46e+TI3jImWVxSXtbVncI7AyAKf:Hy3is+09WVe/n1AyP
Static task
static1
Behavioral task
behavioral1
Sample
408c62dc406ef56f7419da76d094186835c602561f4996384a8e237b7c91bff4.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
408c62dc406ef56f7419da76d094186835c602561f4996384a8e237b7c91bff4
-
Size
553KB
-
MD5
edb080b25e02a4fb6a91e990bc2f2c47
-
SHA1
da5e88f92e424d646de311848c7ae6f3344610d5
-
SHA256
408c62dc406ef56f7419da76d094186835c602561f4996384a8e237b7c91bff4
-
SHA512
1cad0e7dabfe343a35b3996276fd9b5ddf2bfc63da65a93319fb1f4b075ded7710f21719bb6bc2e6ddd5ca507c079ddfb89c457481bab1415e80bdb8387181f4
-
SSDEEP
12288:Hy90P7+Pix46e+TI3jImWVxSXtbVncI7AyAKf:Hy3is+09WVe/n1AyP
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1