General
-
Target
83aa38310892b8743fabfd50bb31f0c0fab540164520745c6dda6b2bc1585f23.exe
-
Size
488KB
-
Sample
241123-3cte6aykdn
-
MD5
d963f5e2b291717fbc0277bec07293a2
-
SHA1
fc9113a56bcbf90e96a554294a20fd6f2f7b37f9
-
SHA256
83aa38310892b8743fabfd50bb31f0c0fab540164520745c6dda6b2bc1585f23
-
SHA512
353587dd049a644f1bd3349640ee32b2254695cc2ecc79f99934a72e03b749b5c5cd93101ca68a42593d1668cc880d63ad49e3e87aa496e98353d7449cb30706
-
SSDEEP
12288:dy90FyKZqLtd16ZTmNv8CqWW6FK1qbWKAA+ph0:dy9T16ZTMv566FK1qbWPF0
Static task
static1
Behavioral task
behavioral1
Sample
83aa38310892b8743fabfd50bb31f0c0fab540164520745c6dda6b2bc1585f23.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
83aa38310892b8743fabfd50bb31f0c0fab540164520745c6dda6b2bc1585f23.exe
-
Size
488KB
-
MD5
d963f5e2b291717fbc0277bec07293a2
-
SHA1
fc9113a56bcbf90e96a554294a20fd6f2f7b37f9
-
SHA256
83aa38310892b8743fabfd50bb31f0c0fab540164520745c6dda6b2bc1585f23
-
SHA512
353587dd049a644f1bd3349640ee32b2254695cc2ecc79f99934a72e03b749b5c5cd93101ca68a42593d1668cc880d63ad49e3e87aa496e98353d7449cb30706
-
SSDEEP
12288:dy90FyKZqLtd16ZTmNv8CqWW6FK1qbWKAA+ph0:dy9T16ZTMv566FK1qbWPF0
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1