General
-
Target
48feb5cc2dc6f1a7e957f7215e69ff09df240fb530395dc93dfd786b2ee49f52
-
Size
414KB
-
Sample
241122-12mmsswqdj
-
MD5
507b15cacc886d026c7f7d34a175c96f
-
SHA1
adb54bc9a9404b2d5857f9da62e03209fe8a0e57
-
SHA256
48feb5cc2dc6f1a7e957f7215e69ff09df240fb530395dc93dfd786b2ee49f52
-
SHA512
543513ec207a7a75880f35e14bfafd96936ff7879b26e4b0e9828a1cf5c7ae48ffad8a5f78eb24bd85aff163fa6d0c70c36fc3204ea1b00e0b7660e6965666b8
-
SSDEEP
6144:lEp0yN90QE4xA1rZwTePb0a8FOgxuyeGkwXlQDoZCGLMw/cA:fy902xuZwTeH8FOgXLlQ8Y5hA
Static task
static1
Behavioral task
behavioral1
Sample
48feb5cc2dc6f1a7e957f7215e69ff09df240fb530395dc93dfd786b2ee49f52.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
48feb5cc2dc6f1a7e957f7215e69ff09df240fb530395dc93dfd786b2ee49f52
-
Size
414KB
-
MD5
507b15cacc886d026c7f7d34a175c96f
-
SHA1
adb54bc9a9404b2d5857f9da62e03209fe8a0e57
-
SHA256
48feb5cc2dc6f1a7e957f7215e69ff09df240fb530395dc93dfd786b2ee49f52
-
SHA512
543513ec207a7a75880f35e14bfafd96936ff7879b26e4b0e9828a1cf5c7ae48ffad8a5f78eb24bd85aff163fa6d0c70c36fc3204ea1b00e0b7660e6965666b8
-
SSDEEP
6144:lEp0yN90QE4xA1rZwTePb0a8FOgxuyeGkwXlQDoZCGLMw/cA:fy902xuZwTeH8FOgXLlQ8Y5hA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1