General
-
Target
8197a23a0e1d0764f985b313c7d7e58a97700fe13b289107075ea63cc15a9f42.exe
-
Size
707KB
-
Sample
241125-fw5afawner
-
MD5
250836ddeb0a22c1e7e30d3355f05e64
-
SHA1
b5c4afb09e6003e1d92bacdbd75502e26eb61cd1
-
SHA256
8197a23a0e1d0764f985b313c7d7e58a97700fe13b289107075ea63cc15a9f42
-
SHA512
ec6eeac817c9b97cc2d520661059fb0dde0ad597f83f6ad21125235276f2ee28362d89f2090fc1e6d53bc166aaed3bcbb9bbdeb80c96142f51c0e2c51be4a132
-
SSDEEP
12288:1y90yu04J+VDNlpvzB2wTaYXXbHW8I5K/SpQbYXbGWPFkA:1yGJ+LB7a8Xb/SXbG2FkA
Static task
static1
Behavioral task
behavioral1
Sample
8197a23a0e1d0764f985b313c7d7e58a97700fe13b289107075ea63cc15a9f42.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8197a23a0e1d0764f985b313c7d7e58a97700fe13b289107075ea63cc15a9f42.exe
-
Size
707KB
-
MD5
250836ddeb0a22c1e7e30d3355f05e64
-
SHA1
b5c4afb09e6003e1d92bacdbd75502e26eb61cd1
-
SHA256
8197a23a0e1d0764f985b313c7d7e58a97700fe13b289107075ea63cc15a9f42
-
SHA512
ec6eeac817c9b97cc2d520661059fb0dde0ad597f83f6ad21125235276f2ee28362d89f2090fc1e6d53bc166aaed3bcbb9bbdeb80c96142f51c0e2c51be4a132
-
SSDEEP
12288:1y90yu04J+VDNlpvzB2wTaYXXbHW8I5K/SpQbYXbGWPFkA:1yGJ+LB7a8Xb/SXbG2FkA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1