General
-
Target
5046261dbc472b3c5a30e01c4ff6ea68ed48e6e0e5d2a04b3f22ae511bf43860.exe
-
Size
568KB
-
Sample
241126-avqg1avjet
-
MD5
0af0dca7b26a4ea99e759c5851847fbe
-
SHA1
f3dbe18ffdde802c8256bda2929938fdb6d4fc0d
-
SHA256
5046261dbc472b3c5a30e01c4ff6ea68ed48e6e0e5d2a04b3f22ae511bf43860
-
SHA512
37e7b9f665f86157c3bda290194c817591f3b5369ab7f1372676c7656f0eaad12cf66f841e0835177b088ee4990940bea11c9d6f4031c22889ec8d4bf05921ff
-
SSDEEP
12288:ty90Kn5VbJalOYt00Z7PJpgAyQC+i3C6tMOQlVh2eW:tyhNJIOYt1ZlC2C+QEOQDhlW
Static task
static1
Behavioral task
behavioral1
Sample
5046261dbc472b3c5a30e01c4ff6ea68ed48e6e0e5d2a04b3f22ae511bf43860.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5046261dbc472b3c5a30e01c4ff6ea68ed48e6e0e5d2a04b3f22ae511bf43860.exe
-
Size
568KB
-
MD5
0af0dca7b26a4ea99e759c5851847fbe
-
SHA1
f3dbe18ffdde802c8256bda2929938fdb6d4fc0d
-
SHA256
5046261dbc472b3c5a30e01c4ff6ea68ed48e6e0e5d2a04b3f22ae511bf43860
-
SHA512
37e7b9f665f86157c3bda290194c817591f3b5369ab7f1372676c7656f0eaad12cf66f841e0835177b088ee4990940bea11c9d6f4031c22889ec8d4bf05921ff
-
SSDEEP
12288:ty90Kn5VbJalOYt00Z7PJpgAyQC+i3C6tMOQlVh2eW:tyhNJIOYt1ZlC2C+QEOQDhlW
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1