General
-
Target
514ff1a12b0e1e8320c34f2ef00e865266c7daa5ef15baaf44745336b9c737a7
-
Size
414KB
-
Sample
241121-3pcceazmez
-
MD5
1ca681b7c7d385224732a56bb80f8272
-
SHA1
fa9f59a6f571dbc10d29689cec406cd3104d781e
-
SHA256
514ff1a12b0e1e8320c34f2ef00e865266c7daa5ef15baaf44745336b9c737a7
-
SHA512
7ff5cb8a80d47fd84009a99f1c053d5755b40670d32f444c434c89e5f3b35c394a332f7bddc7422f2914dc4469fb7d559c8fc31dd2106537ab35fabbc7a97552
-
SSDEEP
6144:B2p0yN90QEtb+6o+may+REo0zvhEyKW1rdb7NY5TBp005CB0wd+UZ:Jy90bbK+0SCFfo/uFZ
Static task
static1
Behavioral task
behavioral1
Sample
514ff1a12b0e1e8320c34f2ef00e865266c7daa5ef15baaf44745336b9c737a7.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
514ff1a12b0e1e8320c34f2ef00e865266c7daa5ef15baaf44745336b9c737a7
-
Size
414KB
-
MD5
1ca681b7c7d385224732a56bb80f8272
-
SHA1
fa9f59a6f571dbc10d29689cec406cd3104d781e
-
SHA256
514ff1a12b0e1e8320c34f2ef00e865266c7daa5ef15baaf44745336b9c737a7
-
SHA512
7ff5cb8a80d47fd84009a99f1c053d5755b40670d32f444c434c89e5f3b35c394a332f7bddc7422f2914dc4469fb7d559c8fc31dd2106537ab35fabbc7a97552
-
SSDEEP
6144:B2p0yN90QEtb+6o+may+REo0zvhEyKW1rdb7NY5TBp005CB0wd+UZ:Jy90bbK+0SCFfo/uFZ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1