General
-
Target
0cd54d50cd730240cae1c05a345e5c4c8fb3f15cda3d6b451523e081e67bc404N.exe
-
Size
568KB
-
Sample
241126-2egcyazjhj
-
MD5
93ef32989ae53da61ec6c73bac0419e0
-
SHA1
c1ed1c5b2d677215753a80d31935bd8edc8a95eb
-
SHA256
0cd54d50cd730240cae1c05a345e5c4c8fb3f15cda3d6b451523e081e67bc404
-
SHA512
840a506492e156e6f008f9a295a08319fc252a62873d5e2c6025f947d443ee7e47347fdea085374577595dc0d5dfdb8dbe3dd4de8b5231e96651e07344742cf9
-
SSDEEP
12288:Fy90UnVGLhZktvpwmsQpU0jyo3o3YwC6VW6vMF9qobO4:Fyjq+vmmsQG073o3xyI2zK4
Static task
static1
Behavioral task
behavioral1
Sample
0cd54d50cd730240cae1c05a345e5c4c8fb3f15cda3d6b451523e081e67bc404N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
0cd54d50cd730240cae1c05a345e5c4c8fb3f15cda3d6b451523e081e67bc404N.exe
-
Size
568KB
-
MD5
93ef32989ae53da61ec6c73bac0419e0
-
SHA1
c1ed1c5b2d677215753a80d31935bd8edc8a95eb
-
SHA256
0cd54d50cd730240cae1c05a345e5c4c8fb3f15cda3d6b451523e081e67bc404
-
SHA512
840a506492e156e6f008f9a295a08319fc252a62873d5e2c6025f947d443ee7e47347fdea085374577595dc0d5dfdb8dbe3dd4de8b5231e96651e07344742cf9
-
SSDEEP
12288:Fy90UnVGLhZktvpwmsQpU0jyo3o3YwC6VW6vMF9qobO4:Fyjq+vmmsQG073o3xyI2zK4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1