General
-
Target
648339d253c706697c52e65913e69018598960327d66903b32d57ebcaf84a91f.exe
-
Size
705KB
-
Sample
241124-pks8gayqhs
-
MD5
1988ed6e31b445d6e259e703435f7216
-
SHA1
49c027550cbfd739e53fb7ccfa79796e657dcee7
-
SHA256
648339d253c706697c52e65913e69018598960327d66903b32d57ebcaf84a91f
-
SHA512
9378a7a511467ade1b8ddf7e4044afd4782633b9fc740a45a8359db63a77f911e037fef2b45c9cb7140e0be9f005942134acd05bb2b37b05a0561042c32030fa
-
SSDEEP
12288:vy90/mOPa3hpDV3PkMiSqQGi/m7Q0dh58KZB69XLD/NH60:vyYHa3Xp3+xi/ms258moXLD/h60
Static task
static1
Behavioral task
behavioral1
Sample
648339d253c706697c52e65913e69018598960327d66903b32d57ebcaf84a91f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
648339d253c706697c52e65913e69018598960327d66903b32d57ebcaf84a91f.exe
-
Size
705KB
-
MD5
1988ed6e31b445d6e259e703435f7216
-
SHA1
49c027550cbfd739e53fb7ccfa79796e657dcee7
-
SHA256
648339d253c706697c52e65913e69018598960327d66903b32d57ebcaf84a91f
-
SHA512
9378a7a511467ade1b8ddf7e4044afd4782633b9fc740a45a8359db63a77f911e037fef2b45c9cb7140e0be9f005942134acd05bb2b37b05a0561042c32030fa
-
SSDEEP
12288:vy90/mOPa3hpDV3PkMiSqQGi/m7Q0dh58KZB69XLD/NH60:vyYHa3Xp3+xi/ms258moXLD/h60
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1