General
-
Target
479783983e0501a81a53d714d7580743b7fda5d8465674d22081ba0eee3c3a79N.exe
-
Size
568KB
-
Sample
241125-3wyh8asqfw
-
MD5
ffb69bb52fd2cb264eda12b5dac7fac0
-
SHA1
ccbe6812269d478773dabf375830cf2e0edaef93
-
SHA256
479783983e0501a81a53d714d7580743b7fda5d8465674d22081ba0eee3c3a79
-
SHA512
03ac74e0ac9bb585e6cdb388b62124763ffd835465d45a323fa2368a7503700c3f0037ea987c1cd835bf0ed744e6ec5098f9226abe9e09c7ca943f0990ef286f
-
SSDEEP
12288:ty90Kn5VbJalOYt00Z7PJpgAyQC+i3C6tMOQlVh2e:tyhNJIOYt1ZlC2C+QEOQDhl
Static task
static1
Behavioral task
behavioral1
Sample
479783983e0501a81a53d714d7580743b7fda5d8465674d22081ba0eee3c3a79N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
479783983e0501a81a53d714d7580743b7fda5d8465674d22081ba0eee3c3a79N.exe
-
Size
568KB
-
MD5
ffb69bb52fd2cb264eda12b5dac7fac0
-
SHA1
ccbe6812269d478773dabf375830cf2e0edaef93
-
SHA256
479783983e0501a81a53d714d7580743b7fda5d8465674d22081ba0eee3c3a79
-
SHA512
03ac74e0ac9bb585e6cdb388b62124763ffd835465d45a323fa2368a7503700c3f0037ea987c1cd835bf0ed744e6ec5098f9226abe9e09c7ca943f0990ef286f
-
SSDEEP
12288:ty90Kn5VbJalOYt00Z7PJpgAyQC+i3C6tMOQlVh2e:tyhNJIOYt1ZlC2C+QEOQDhl
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1