General
-
Target
ed364a0a5ed2b3d00214914f9bda1f3e393a6b17186b79a9644bfadfb791a950
-
Size
1.5MB
-
Sample
250206-hfp7pawlet
-
MD5
acb49e7150e8de6ad028bf9717999d89
-
SHA1
877004bd51b35668cb1901976c514ab8a1576cca
-
SHA256
ed364a0a5ed2b3d00214914f9bda1f3e393a6b17186b79a9644bfadfb791a950
-
SHA512
c52f57cbc7ca69c7b6048c22fccf85c668f5fc5185c8478935b1596fa1fa669f2be24765049db75211364b68aea19397fd52344989677350bf52f05b1cb1fb27
-
SSDEEP
24576:nyzcH+z3JwCgyAuIW9VPJe+MvTnfZjD1VduzJ0lnWp+RjPs6JfDnVB6Fw:yzcH8Nnhe+onZhVcF0lWpSPsULnV0
Static task
static1
Behavioral task
behavioral1
Sample
ed364a0a5ed2b3d00214914f9bda1f3e393a6b17186b79a9644bfadfb791a950.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
ed364a0a5ed2b3d00214914f9bda1f3e393a6b17186b79a9644bfadfb791a950
-
Size
1.5MB
-
MD5
acb49e7150e8de6ad028bf9717999d89
-
SHA1
877004bd51b35668cb1901976c514ab8a1576cca
-
SHA256
ed364a0a5ed2b3d00214914f9bda1f3e393a6b17186b79a9644bfadfb791a950
-
SHA512
c52f57cbc7ca69c7b6048c22fccf85c668f5fc5185c8478935b1596fa1fa669f2be24765049db75211364b68aea19397fd52344989677350bf52f05b1cb1fb27
-
SSDEEP
24576:nyzcH+z3JwCgyAuIW9VPJe+MvTnfZjD1VduzJ0lnWp+RjPs6JfDnVB6Fw:yzcH8Nnhe+onZhVcF0lWpSPsULnV0
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4