General
-
Target
11742977c92da4c368962c7bedce37864b1c78fd0e5ee8b8008c7928093ba3b8N.exe
-
Size
414KB
-
Sample
241126-g1gklsvpam
-
MD5
308239976e840ee5660f66c04c0c82f0
-
SHA1
108650b0238e66e19a5f7141e72a4cc2febf013c
-
SHA256
11742977c92da4c368962c7bedce37864b1c78fd0e5ee8b8008c7928093ba3b8
-
SHA512
58b725c5c8f49a930ba939ba0dd483635a77a9eb04b53e071a358c19af67d2cacfe5fbac8de112cb5985be52be3032bcb4cefd22073c76a835ecf73e5e671b90
-
SSDEEP
6144:h0p0yN90QEP9j1rZwTePb0a8FOgxuyeGkwXlQDoZCGLMw/cp:Ty90x9ZZwTeH8FOgXLlQ8Y5hp
Static task
static1
Behavioral task
behavioral1
Sample
11742977c92da4c368962c7bedce37864b1c78fd0e5ee8b8008c7928093ba3b8N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
11742977c92da4c368962c7bedce37864b1c78fd0e5ee8b8008c7928093ba3b8N.exe
-
Size
414KB
-
MD5
308239976e840ee5660f66c04c0c82f0
-
SHA1
108650b0238e66e19a5f7141e72a4cc2febf013c
-
SHA256
11742977c92da4c368962c7bedce37864b1c78fd0e5ee8b8008c7928093ba3b8
-
SHA512
58b725c5c8f49a930ba939ba0dd483635a77a9eb04b53e071a358c19af67d2cacfe5fbac8de112cb5985be52be3032bcb4cefd22073c76a835ecf73e5e671b90
-
SSDEEP
6144:h0p0yN90QEP9j1rZwTePb0a8FOgxuyeGkwXlQDoZCGLMw/cp:Ty90x9ZZwTeH8FOgXLlQ8Y5hp
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1