General
-
Target
de646e380ecfbbf9771b329b7dfc03f67657786e9f12ce9b96b1d8d5d3fc6f9f.exe
-
Size
569KB
-
Sample
241125-vtaqdaxmcy
-
MD5
f5bf8ce2c559b6f80439e192645ab0b7
-
SHA1
0f334a4286d6c3e82f16683bd7727641f1011a7d
-
SHA256
de646e380ecfbbf9771b329b7dfc03f67657786e9f12ce9b96b1d8d5d3fc6f9f
-
SHA512
dd41962020a36cb0bac0230c1af3f8f341b7d8742be2b3a0117afa82f40efda1e942cd5dd1c28a5b3f3296516fde8039192c98893569e5a892ee6b86be82cee5
-
SSDEEP
12288:3y90acPZzhtCI/X3s8K+dBnCY8u0VT8uOFyL1614tLc:3yxcPZnt/Xc8/Bn6uWyUI8Lc
Static task
static1
Behavioral task
behavioral1
Sample
de646e380ecfbbf9771b329b7dfc03f67657786e9f12ce9b96b1d8d5d3fc6f9f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
de646e380ecfbbf9771b329b7dfc03f67657786e9f12ce9b96b1d8d5d3fc6f9f.exe
-
Size
569KB
-
MD5
f5bf8ce2c559b6f80439e192645ab0b7
-
SHA1
0f334a4286d6c3e82f16683bd7727641f1011a7d
-
SHA256
de646e380ecfbbf9771b329b7dfc03f67657786e9f12ce9b96b1d8d5d3fc6f9f
-
SHA512
dd41962020a36cb0bac0230c1af3f8f341b7d8742be2b3a0117afa82f40efda1e942cd5dd1c28a5b3f3296516fde8039192c98893569e5a892ee6b86be82cee5
-
SSDEEP
12288:3y90acPZzhtCI/X3s8K+dBnCY8u0VT8uOFyL1614tLc:3yxcPZnt/Xc8/Bn6uWyUI8Lc
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1