General
-
Target
33585b61657f0b7e3c0cd31838a8ea62dbaa8f5943bb184b96c8aa57e66799fd.exe
-
Size
551KB
-
Sample
241125-my6dvazkbm
-
MD5
66fcfb8383f1bca35653edea94fe80ea
-
SHA1
8368f4035af6b14456039a23aa755cde053a41a7
-
SHA256
33585b61657f0b7e3c0cd31838a8ea62dbaa8f5943bb184b96c8aa57e66799fd
-
SHA512
ac28c9c62774c836d9b459f22a865ecb71fc799029e8581258c44ea246e86d3f8bf7a05a9f1a62ad28b4b8ce15c5fd62f1bb7150befbcfcf39eb17b0bfe6678b
-
SSDEEP
12288:Ry906w1WdITqkdUW5O2h+OxdrnJY8c0paZQ7GA:Ry/w1WdMoW5O2+0rnTc2qA
Static task
static1
Behavioral task
behavioral1
Sample
33585b61657f0b7e3c0cd31838a8ea62dbaa8f5943bb184b96c8aa57e66799fd.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
33585b61657f0b7e3c0cd31838a8ea62dbaa8f5943bb184b96c8aa57e66799fd.exe
-
Size
551KB
-
MD5
66fcfb8383f1bca35653edea94fe80ea
-
SHA1
8368f4035af6b14456039a23aa755cde053a41a7
-
SHA256
33585b61657f0b7e3c0cd31838a8ea62dbaa8f5943bb184b96c8aa57e66799fd
-
SHA512
ac28c9c62774c836d9b459f22a865ecb71fc799029e8581258c44ea246e86d3f8bf7a05a9f1a62ad28b4b8ce15c5fd62f1bb7150befbcfcf39eb17b0bfe6678b
-
SSDEEP
12288:Ry906w1WdITqkdUW5O2h+OxdrnJY8c0paZQ7GA:Ry/w1WdMoW5O2+0rnTc2qA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1