General
-
Target
d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca
-
Size
553KB
-
Sample
241121-kslfdazrex
-
MD5
7f1e656b1ee20bf673c614d89697df19
-
SHA1
e6a4cd2afda729e451c0c5adb91aeb9919f9a783
-
SHA256
d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca
-
SHA512
e38e3da6d8ab99bef3a211e797641cf709c433be9050279fdcd7da22d5688e5d30e9d76c5d2ab102dd806b1e160f296439d014969c59ef002524a4de2105cec3
-
SSDEEP
6144:elp0yN90QEKwZHnmu7ybLcw2QK7jgxQjmZ/SGAJK33MCoQgQ+ock/tnGaK2ncXYy:py90HZHx4LcrvRjAHAOguXtnVncITA5
Static task
static1
Behavioral task
behavioral1
Sample
d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca
-
Size
553KB
-
MD5
7f1e656b1ee20bf673c614d89697df19
-
SHA1
e6a4cd2afda729e451c0c5adb91aeb9919f9a783
-
SHA256
d2d66ab66c4a40e5fb571bf7cdc527f6c6b7478940a9c6e3717fb256b78b77ca
-
SHA512
e38e3da6d8ab99bef3a211e797641cf709c433be9050279fdcd7da22d5688e5d30e9d76c5d2ab102dd806b1e160f296439d014969c59ef002524a4de2105cec3
-
SSDEEP
6144:elp0yN90QEKwZHnmu7ybLcw2QK7jgxQjmZ/SGAJK33MCoQgQ+ock/tnGaK2ncXYy:py90HZHx4LcrvRjAHAOguXtnVncITA5
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1